summaryrefslogtreecommitdiff
path: root/client/src/lib
diff options
context:
space:
mode:
Diffstat (limited to 'client/src/lib')
-rw-r--r--client/src/lib/db/backupDB.js313
1 files changed, 155 insertions, 158 deletions
diff --git a/client/src/lib/db/backupDB.js b/client/src/lib/db/backupDB.js
index 9e85725..3df1c68 100644
--- a/client/src/lib/db/backupDB.js
+++ b/client/src/lib/db/backupDB.js
@@ -7,10 +7,10 @@ export const backupDB = {
"medium": "Natural Phenomenon & Imagery",
"category": "Surveillance",
"keywords": "#Camera #Verticality #Linearity #Mimicry #Mimesis #Perspective #Reflection #Mirroring #Double #Duplication #Reproduction #Reproductivity #Self-consciousness #Eye #Surveillance #Photography #War #Painting #Police \r\n",
- "description": "The 'Camera Obscura' is an optical phenomenon that occurs when an image is projected through a small hole on a screen or wall – as a reversed and inverted image on an opposite surface. The term \"camera obscura\" refers to constructions or devices that make use of that principle within a box, tent or room. Allegedly, early occurrences of camera obscura effects inspired paleolithic cave paintings. In the 18th century the technology was first used to convey images of observed subjects in a way that the observer remains invisible to the observed. The Camera Obscura is seen as the forerunner of modern photography and had large influence on Renaissance art. According to the so called Hockney-Falco thesis in art history, advances in realism and accuracy in Western art since the Renaissance period were primarily the result of optical instruments such as the camera obscura.\r\n",
+ "description": "The 'Camera Obscura' is an optical phenomenon that occurs when an image is projected through a small hole on a screen or wall – as a reversed and inverted image on an opposite surface. The term \"camera obscura\" refers to constructions or devices that make use of that principle within a box, tent or room. Allegedly, early occurrences of camera obscura effects inspired paleolithic cave paintings. In the 18th century, the technology was first used to convey images of observed subjects, such that the observer remains invisible to the observed. The Camera Obscura is seen as a forerunner of modern photography and had a large influence on Renaissance art. According to the so called Hockney-Falco thesis in art history, advances in realism and accuracy in Western art during the Renaissance period were primarily the result of optical instruments such as the camera obscura.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/d0610190-38d4-11e7-9d48-c59d5d130bc6.jpg",
- "caption": "\r\n",
+ "caption": "",
"width": "640",
"height": "328"
},
@@ -32,7 +32,7 @@ export const backupDB = {
"medium": "Religious Idea",
"category": "Surveillance",
"keywords": "#Eye #God #Providence #Guilt #Order #Control #Ethics #Christianity #Judaism #Islam #Bible #education #Skies #Clouds #Manipulation #Illuminati #Kabbalah #Secrecy #Dialectic #Knowledge #Future #Present #Past #Synthesis\r\n",
- "description": "The motive of the divine eye was spread throughout Europe in the wake of the Counter-Reformation; its roots lie in the Antiquity, as well as in Jewish and Christian sources. Augustine described the religious idea of God’s all-seeing eye on the psychological level when he wrote: And from Thee, O lord, unto whose eyes the abyss of man’s conscience is naked, what could be hidden in me though I would not confess it? The psychic aspects of fear, control and education are lanced through the Antique iconography and culminated in the idea of God’s Providence. \r\n",
+ "description": "The motif of the divine eye was spread throughout Europe in the wake of the Counter-Reformation. Its roots lie in the Antiquity, as well as in Jewish and Christian sources. Augustine described the religious idea of God’s all-seeing eye on a psychological level when he wrote: <i>And from Thee, O lord, unto whose eyes the abyss of man’s conscience is naked, what could be hidden in me though I would not confess it?</i> The psychic aspects of fear, control and education are lanced through the Antique iconography and culminated in the idea of God’s Providence. \r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f2d447f0-38d4-11e7-9d48-c59d5d130bc6.jpg",
"caption": "",
@@ -57,7 +57,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#Epidemiology #Health #Surveillance #Sickness #Control #Plague #Immunity #Sickness #Disease #Plague #BlackDeath #HIV #Biology #Pharma-Industry\r\n",
- "description": "Following the WHO, Public Health Surveillance is defined as “the continuous, systematic collection, analysis and interpretation of health-related data needed for the planning, implementation, and evaluation of public health practice.” Such surveillance serves several purposes, for example as early warning system for health emergencies and as documentation praxis which informs on the impact of a certain medical intervention. Health surveillance uses mortality data as a base for measuring public health, a praxis that arose ca. 600 years ago in Europe throughout the emergence of scientific thought in the Renaissance. In the example of HIV, surveillance reports were and are still used to collect data about HIV and AIDS – for example, population rates, numbers of people living with HIV and numbers of people who receive medical care. There have been various debates on human rights and civil liberty in the context of health surveillance. In the case of HIV, health surveillance often resulted in discrimination of sexual orientation.\r\n",
+ "description": "Following the WHO, Public Health Surveillance is defined as “the continuous, systematic collection, analysis and interpretation of health-related data needed for the planning, implementation, and evaluation of public health practice.” Such surveillance serves several purposes, for example as an early warning system for health emergencies and as documentation practice which informs of the impact of medical intervention. Health surveillance uses mortality data as a base for measuring public health, a practice that arose ca. 600 years ago in Europe as part of the emergence of scientific thought in the Renaissance. In the example of HIV, surveillance reports have been used to collect data about HIV and AIDS – for example, population rates, number of people living with HIV and number of people who receive medical care. There have been various debates on human rights and civil liberties in the context of health surveillance. In the case of HIV, health surveillance often resulted in discrimination based on sexual orientation.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9c33f610-38d5-11e7-9d48-c59d5d130bc6.jpg",
"caption": "",
@@ -66,11 +66,11 @@ export const backupDB = {
},
"links": [
{
- "text": "Link text",
+ "text": "Wikipedia",
"uri": "https://en.wikipedia.org/wiki/Public_health_surveillance"
},
{
- "text": "link text",
+ "text": "WHO",
"uri": "http://www.who.int/topics/public_health_surveillance/en/"
}
],
@@ -86,7 +86,7 @@ export const backupDB = {
"medium": "Image",
"category": "Surveillance",
"keywords": "#Big Brother #Surveillance #Control #Gaze #Art",
- "description": "The Dutch on the board above the main figure in the image refers to an old saying which was common in the 15th and 16th century: The Field has Eyes / the Forest has Ears / I want to see, keep silent and hear. It therefore admonishes to be cautious what to say in public. This woodcut represents an early example on the idea of privacy and the awareness of surveillance.\r\n",
+ "description": "The Dutch inscription above the main figure refers to an old saying, common in the 15th and 16th century: <i>The Field has Eyes / the Forest has Ears / I want to see, keep silent and hear.</i> It therefore admonishes one to be cautious what one says in public. This woodcut represents an early example on the idea of privacy and the awareness of surveillance.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f9a43fd0-38d5-11e7-9d48-c59d5d130bc6.jpg",
"caption": "",
@@ -106,7 +106,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#Big Brother #Surveillance #Control #Institution #Interception #Information #Secrets #Deciphering #Espionage #Privacy #Governments #Intelligence #Cryptology\r\n",
- "description": "“Black Chamber” is the name used for secret decipher bureaus established as early as the postal system. Governmentally operated, the bureau would intercept letters, gather intelligence of political rivals and channel them back into the postal system without further notice. The most well-known cases were the Cabinet Noire in France run under Ludwig XIV, the Geheime Kabinettskanzlei (Secret Chancellery) in Vienna, Austria, the British Room 40 and then Bletchley Park that became home to the greatest codebreakers. After World War One, the US established their first crypto-analytical institute to intercept correspondence of other nations. Operating under a bogus company based in New York City, the US-Black Chamber was a direct predecessor of the National Security Agency (NSA).\r\n",
+ "description": "“Black Chamber” is the name used for secret decipher bureaus established as part of the postal system. Governmentally operated, the bureau would intercept letters, gather intelligence on political rivals and channel them back into the postal system without further notice. The most well-known cases were the Cabinet Noire in France run under Louis XIV, the Geheime Kabinettskanzlei (Secret Chancellery) in Vienna, Austria, and the British Room 40 - later called Bletchley Park, which became home to the greatest codebreakers. After World War One, the US established their first crypto-analytical institute to intercept correspondence of other nations. Operating under a bogus company based in New York City, the US Black Chamber was a direct predecessor of the National Security Agency (NSA).\r\n",
"image": {
"uri": "https://upload.wikimedia.org/wikipedia/commons/7/77/Bodleian_Libraries%2C_Le_cabinet_noir_ou-_les_pantins_du_19eme_si%C3%A8cle.jpg",
"caption": "",
@@ -115,11 +115,11 @@ export const backupDB = {
},
"links": [
{
- "text": "Link text",
+ "text": "NY Times",
"uri": "http://www.nytimes.com/2006/01/13/opinion/back-when-spies-played-by-the-rules.html"
},
{
- "text": "Link text",
+ "text": "NSA",
"uri": "https://www.nsa.gov/about/cryptologic-heritage/center-cryptologic-history/pearl-harbor-review/black-chamber.shtml"
}
],
@@ -135,16 +135,16 @@ export const backupDB = {
"medium": "Image",
"category": "Surveillance",
"keywords": "#Big Brother #Surveillance #Control #Bentham #Panopticon #Foucault #Prison #Institution #Totalitarianism #Observation\r\n",
- "description": "The panopticon, designed by Jeremy Bentham in the late 18th century, is a circular architectural draft for an institution with an observation tower in its centre. It’s surrounded by an outer wall that contains cells for occupants. Residing within light-flooded cells, occupants would be distinguishable to an official or guard. Yet, occupants would be invisible to each other, with concrete walls dividing their cells. Due to the bright lighting, occupants would not be able to tell if and when they are being watched. Although usually associated with prisons, panoptic architecture might be used in similar institutions with surveillance needs, such as schools, factories, or hospitals. \r\n",
+ "description": "Designed by Jeremy Bentham in the late 18th century, the Panopticon is an architectural draft for a circular institution with an observation tower in its centre. It is surrounded by an outer wall that contains cells for occupants. Residing within light-flooded cells, occupants would be visible to an official or guard, yet they would be invisible to each other, with concrete walls dividing their cells. Due to the bright lighting, occupants would not be able to tell if and when they were being watched. Although usually associated with prisons, panoptic architecture might be used in similar institutions with surveillance needs, such as schools, factories, or hospitals. \r\n",
"image": {
"uri": "https://upload.wikimedia.org/wikipedia/commons/thumb/1/11/Panopticon.jpg/544px-Panopticon.jpg",
- "caption": "\r\n",
+ "caption": "",
"width": "544",
"height": "600"
},
"links": [
{
- "text": "Link text ",
+ "text": "Wikipedia",
"uri": "https://en.wikipedia.org/wiki/Panopticon"
}
],
@@ -160,7 +160,7 @@ export const backupDB = {
"medium": "Image",
"category": "Drones",
"keywords": "#Drones #UAV #Airstrike #Attack #Military #Warfare #Venice #Austria",
- "description": "Arguably, this was the first drone strike in history: In August 22nd 1849 Venice was bombarded by unmanned balloons launched by the Austrians who controlled much of Italy at the time. The experimental approach of using hot air balloons, which carried ordnance, was a consequence of the actual topography of Venice – since the city was surrounded by water, the Austrian artillery could not intrude. This incidence is the first known use of aerial bombing. \r\n\r\nThe image below illustrates an artistic interpretation of the bombing from a russian source. \r\n",
+ "description": "Arguably, this was the first drone strike in history: In August 22nd 1849 Venice was bombarded by unmanned balloons launched by the Austrians, who controlled much of Italy at the time. The experimental approach of using hot air balloons, which carried ordnance, was a consequence of the actual topography of Venice. Since the city was surrounded by water, the Austrian artillery could not intrude. This incident is the first known use of aerial bombing. \r\n\r\nThe image below illustrates an artistic interpretation of the bombing from a Russian source. \r\n",
"image": {
"uri": "http://www.ctie.monash.edu/hargrave/images/balloonbombs1848_500.jpg",
"caption": "",
@@ -169,7 +169,7 @@ export const backupDB = {
},
"links": [
{
- "text": "Link text",
+ "text": "CTIE History",
"uri": "http://www.ctie.monash.edu/hargrave/rpav_home.html#Beginnings"
}
],
@@ -185,7 +185,7 @@ export const backupDB = {
"medium": "Image",
"category": "Surveillance",
"keywords": "#Aerial-Photography #Verticality #Photography\r\n",
- "description": "The photographer J.W. Black launched his solo career in 1860 with the production of a series of photographs taken from Samuel King's hot-air balloon the \"Queen of the Air.\" Black's views of Boston were the first aerial photographs taken in the US; two years earlier the Frenchman Nadar had made history with similar views of Paris.\r\n\r\n",
+ "description": "The photographer J.W. Black launched his solo career in 1860 with the production of a series of photographs taken from Samuel King's hot-air balloon, the \"Queen of the Air.\" Black's views of Boston were the first aerial photographs taken in the US. Two years earlier, the French photographer Nadar had made history with similar views of Paris.\r\n\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/c505b300-3653-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -195,7 +195,7 @@ export const backupDB = {
"credit": "James Wallace Black / 1860 / Public Domain\r\n",
"links": [
{
- "text": "Link text",
+ "text": "Met Museum",
"uri": "http://www.metmuseum.org/art/collection/search/283189"
}
],
@@ -210,7 +210,7 @@ export const backupDB = {
"medium": "Image",
"category": "Facial Recognition",
"keywords": "#Facial Recognition #Prison #Photography #Biometrics #Photography\r\n",
- "description": "In Victorian times photography was used for the identification of prisoners. It was perceived as a more humane alternative to branding them. Some Victorian police would refer to the camera as ‘angel copier‘. The shown engraving depicts a prisoner resisting being photographed.\r\n",
+ "description": "In Victorian times, photography was used for the identification of prisoners. It was perceived as a more humane alternative to branding them. Some Victorian police would refer to the camera as ‘angel copier‘. This engraving depicts a prisoner resisting being photographed.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/26cab0e0-3654-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -220,7 +220,7 @@ export const backupDB = {
"credit": "Samuel Luke Fildes / The Graphic / 1873 via Jennifer Tucker",
"links": [
{
- "text": "link text",
+ "text": "Boston Globe",
"uri": "https://www.bostonglobe.com/ideas/2014/11/23/facial-recognition-technology-goes-way-back/CkWaxzozvFcveQ7kvdLHGI/story.html"
}
],
@@ -235,21 +235,21 @@ export const backupDB = {
"medium": "Image",
"category": "Surveillance",
"keywords": "#Biometrics #Prison #Information #Control #Identification #Police\r\n",
- "description": "Fingerprint characteristics were studied as far back as mid-1600s and used as means of identification by British colonialists in India in the mid 19th century. Several people are credited with classifying the fingerprinting system for means of identification in the criminal sector: Sir Francis Galton, a British anthropologist who published a book on the forensic science of fingerprints and claimed the chance of two people having the same fingerprint was about one to 64 million. Henry Fauld, a scottish scientist, and Edward Henry, a British police commissioner who developed the Henry Classification System which served to sort fingerprints by their physiological characteristics was the basis of the modern-day Automated Fingerprint Identification System (AFIS) that was used up until the 1990s. The image indicates the beginnings of fingerprinting, implemented by Sir William James Herschel, Chief Magistrate of the Hooghly district in Jungipoor, India in 1858 in a contract with a local businessman.\r\n",
+ "description": "Fingerprint characteristics were studied as far back as the mid-1600s and used as means of identification by British colonialists in India in the mid 19th century. Several people are credited with classifying the fingerprinting system for means of identification in the criminal sector. Sir Francis Galton, a British anthropologist, published a book on the forensic science of fingerprints and claimed the chance of two people having the same fingerprint was about one in 64 million. Henry Faulds, a Scottish scientist, hit upon the idea while on an archaeological dig and soon after used it to exonerate one of his staff who was accused of robbery. Edward Henry, a British police commissioner, developed the Henry Classification System, which served to sort fingerprints by their physiological characteristics, and was the basis of the modern-day Automated Fingerprint Identification System (AFIS) which was used up until the 1990s. The image above indicates the beginnings of fingerprinting, implemented in 1858 by Sir William James Herschel, Chief Magistrate of the Hooghly district in Jungipoor, India, in a contract with a local businessman.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/cc92b950-3654-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "331"
},
- "credit": " Sir William James Herschel, “The Origin of Finger Printing\" 1916., (Public Domain)\r\n",
+ "credit": "Sir William James Herschel, “The Origin of Finger Printing\" 1916., (Public Domain)",
"links": [
{
- "text": "Link text",
+ "text": "ONIN",
"uri": "http://www.onin.com/fp/fphistory.html"
},
{
- "text": "Link text ",
+ "text": "Archive.org",
"uri": "https://archive.org/details/originoffingerpr00hersrich"
}
],
@@ -264,7 +264,7 @@ export const backupDB = {
"medium": "Image",
"category": "Facial Recognition",
"keywords": "#Facial Recognition #Biometrics #Prison #Information #Photography #Police #Identification #Technology\r\n",
- "description": "Bertillonage is a system of measuring and categorizing individuals, also known as anthropometry. It was named after the French criminologist and anthropologist Alphonse Bertillon and used from the Parisian police from 1883 to track and identify criminals. In addition of a frontal and profile portrait photograph (the ‘mug shot‘), the body measurements and feature classifications of the individual were collected on a card. The cards were then systematically filed so they could be easily retrieved. The Bertillonage system was later adopted by police forces in Great Britain, Europe and the Americas until it was replaced by using fingerprints for identification in the early 20th century.\r\n",
+ "description": "Bertillonage is a system of measuring and categorizing individuals, also known as anthropometry. It was named after the French criminologist and anthropologist Alphonse Bertillon and used by the Parisian police from 1883 to track and identify criminals. In addition to a frontal and profile portrait photograph (the ‘mug shot‘), the body measurements and feature classifications of the individual were collected on a card. The cards were then systematically filed so they could be easily retrieved. The Bertillonage system was later adopted by police forces in Great Britain, Europe and the Americas until it was replaced by fingerprinting in the early 20th century.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/38befc10-3655-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -274,7 +274,7 @@ export const backupDB = {
"credit": "Creative Commons CC0 1.0 Universal Public Domain Dedication\r\n",
"links": [
{
- "text": "Link text",
+ "text": "NIH",
"uri": "https://www.nlm.nih.gov/visibleproofs/galleries/biographies/bertillon.html"
}
],
@@ -289,7 +289,7 @@ export const backupDB = {
"medium": "Image",
"category": "Facial Recognition",
"keywords": "#Facial Recognition #Biometrics #Verticality #Photography #All-Seeing Eye\r\n",
- "description": "In 1903, Alphonse Bertillon, who is known to have standardized identification methods for criminals and credited with the invention of the mug-shot, introduced metric photography to investigate crime scenes. He constructed an about two meters high tripod, with which one could take a vertical perspective photographs of murder victims at the places of their deaths. This way, it was possible to provide with full photographic evidence. He referred to the bird’s-eye perspective as a “God’s-eye view”. Bertillons metric photography was applied at the criminal department of forensic medicine and anthropology in France. The photo depicts a demonstration with a false corpse.\r\n",
+ "description": "In 1903, Alphonse Bertillon, who is known to have standardized identification methods for criminals and credited with the invention of the mug shot, introduced metric photography to investigate crime scenes. He constructed a tripod about two meters high, with which one could take vertical perspective photographs of murder victims at the place of their death. Thus it was possible to document the deceased with full photographic evidence. He referred to the overhead perspective as a “God’s-eye view”. Bertillon's metric photography was applied at the criminal department of forensic medicine and anthropology in France. The photo depicts a demonstration with a false corpse.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/81cf0e40-3655-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -299,7 +299,7 @@ export const backupDB = {
"credit": "(1) Rodolphe A Reiss, Demonstration of the Bertillon metric photography system, 1925. © RA Reiss, courtesy of Collection of the Institut de Police Scientifique et de Criminologie de l’Université de Lausanne.\r\n(2) A demonstration of the Bertillon metric photography system, 1908 Credit: Archives de la préfecture de Police \r\n",
"links": [
{
- "text": "Link text",
+ "text": "Archive.org",
"uri": "https://archive.org/details/cu31924096442185"
}
],
@@ -313,8 +313,8 @@ export const backupDB = {
"title": "Aelita: Queen of Mars",
"medium": "Film",
"category": "Surveillance",
- "keywords": "#Telescope #Television #silent film #totalitarianism #futurism #gaze #observation #radio\r\n",
- "description": "Decades before cameras were used for surveillance, the Soviet film Aelita: Queen of Mars was one of the first to depict television as an instrument of those in power to oversee the working class. In the film, a mysterious radio message is beamed around the world; among the engineers who receive it are Los, the film’s hero, and his colleague Spiridonov. Los is an individualist dreamer. Aelita is the daughter of Tuskub, the ruler of a totalitarian state on Mars. With a telescope, Aelita is watching Los. As if by telepathy, Los becomes obsessed about being watched by her.\r\n",
+ "keywords": "#Telescope #Television #silent film #totalitarianism #futurism #gaze #observation #radio\r\n",
+ "description": "Decades before cameras were used for surveillance, the Soviet film <i>Aelita: Queen of Mars</i> was one of the first to depict television as an instrument of those in power to oversee the working class. In the film, a mysterious radio message is beamed around the world; among the engineers who receive it are Los, the film’s hero, and his colleague Spiridonov. Los is an individualistic dreamer. Aelita is the daughter of Tuskub, the ruler of a totalitarian state on Mars. With a telescope, Aelita is watching Los. As if through telepathy, Los becomes obsessed about being watched by her.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/cf791af0-3655-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -324,11 +324,11 @@ export const backupDB = {
"credit": "",
"links": [
{
- "text": "Link text",
+ "text": "IMDB",
"uri": "http://www.imdb.com/title/tt0014646/"
},
{
- "text": "Link text",
+ "text": "Wikipedia",
"uri": "https://en.wikipedia.org/wiki/Aelita"
}
],
@@ -343,10 +343,10 @@ export const backupDB = {
"medium": "Novel",
"category": "Surveillance",
"keywords": "#Castle #paranoia #despotism #All-seeing-Eye\r\n",
- "description": "Franz Kafka’s The Castle depicts a world dominated by uncertainty: everything is opaque and ambiguous. K., arrives in a village where he might have been summoned to work as a land surveyor. The villagers seem to be expecting and not expecting him at the same time; there seems to be a job – and no job. Governing the village is a castle from which officials give contradicting orders. Even though the castle’s bureaucracy seems arbitrary or incompetent, the inhabitants of the village hold the officials and the castle in the highest esteem, while completely ignoring the reasons behind any of the officials decisions. Though Kafka’s novel does not feature any actual surveillance technology – and it is further unclear if the bureaucracy of the officials is actually efficient – the general atmosphere is one of mistrust, paranoia and despotism that is commonly associated with a surveillance society. \r\n",
+ "description": "Franz Kafka’s <i>The Castle</i> depicts a world dominated by uncertainty: everything is opaque and ambiguous. The protagonist, K., arrives in a village where he might have been summoned to work as a land surveyor. The villagers seem to be expecting and not expecting him at the same time; there seems to be a job – and no job. Governing the village is a castle from which officials give contradicting orders. Even though the castle’s bureaucracy seems arbitrary or incompetent, the inhabitants of the village hold the officials and the castle in the highest esteem, while completely ignoring the reasons behind any of the officials’ decisions. Though Kafka’s novel does not feature any actual surveillance technology – and it is further unclear if the bureaucracy of the officials is actually efficient – the general atmosphere is one of mistrust, paranoia, and despotism that is commonly associated with a surveillance society. \r\n\r\nQuote : “I dream of a grave, deep and narrow, where we could clasp each other in our arms as with clamps, and I would hide my face in you and you would hide your face in me, and nobody would ever see us any more”",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/0fb161e0-3656-11e7-a37a-4579121b15f0.jpg",
- "caption": "Quote : “I dream of a grave, deep and narrow, where we could clasp each other in our arms as with clamps, and I would hide my face in you and you would hide your face in me, and nobody would ever see us any more” ",
+ "caption": "",
"width": "180",
"height": "281"
},
@@ -354,7 +354,12 @@ export const backupDB = {
"disabled": false,
"__index": 17,
"dateCreated": "Thu, 11 May 2017 14:29:05 GMT",
- "links": []
+ "links": [
+ {
+ "text": "Wikipedia",
+ "uri": "https://en.wikipedia.org/wiki/The_Castle_(novel)"
+ }
+ ]
},
{
"id": "queen-bee-and-drone",
@@ -363,7 +368,7 @@ export const backupDB = {
"medium": "Item / Image",
"category": "Drones",
"keywords": "#Drone #Warfare #Airstrikes #Technology #Airplanes #Attack #UAV #Technology\r\n",
- "description": "Investing into development of remotely controlled vehicles sped after World War I. Although the DH-82B Queen Bee had many predecessors, it was the first full production, fully-sized, reusable, pilotless aircraft that was used for anti-aircraft gunnery practice. It was designed by engineer Geoffrey Havilland from the British Air Force, who was a passionated amateur entomologist and would call his aircrafts after insects (Tiger Moth, Fox Moth, Mosquito, and Dragonfly). In 1935, a US Navy admiral visited the Royal Air and was demonstrated the Queen Bee. Upon his return to the US, he assigned to develop a similar system for gunnery training and adopted the name drone, as an homage to the Queen Bee. Since then the name drone became a designation for remotely flown aircraft systems.\r\n",
+ "description": "Investment into development of remotely controlled vehicles increased after World War I. Although the DH-82B Queen Bee had many predecessors, it was the first full production, fully-sized, reusable, pilotless aircraft that was used for anti-aircraft gunnery practice. It was designed by engineer Geoffrey Havilland from the British Air Force, who was a passionate amateur entomologist and would name his aircraft after insects (Tiger Moth, Fox Moth, Mosquito, and Dragonfly). In 1935, a US Navy admiral visited the Royal Air and observed a demonstration of the Queen Bee. Upon his return to the US, he requested development of a similar system for gunnery training and adopted the name <i>drone</i>, as an homage to the Queen Bee. Since then, the name drone became a designation for remotely flown aircraft systems.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/60afc9b0-3656-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -392,7 +397,7 @@ export const backupDB = {
"medium": "Film",
"category": "Surveillance",
"keywords": "#Television #Surveillance #Misuse #Technology\r\n",
- "description": "In the German film production World Without a Mask (1934) an engineer accidentally invents a television apparatus which can see through walls. Soon enough, the criminal underworld wants to profit from this technology.\r\n",
+ "description": "In the German film production <i>World Without a Mask</i> (1934) an engineer accidentally invents a television apparatus which can see through walls. Soon enough, the criminal underworld wants to profit from this technology.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/d076e670-3656-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -402,7 +407,7 @@ export const backupDB = {
"credit": "unknown\r\n",
"links": [
{
- "text": "Link text ",
+ "text": "IMDB",
"uri": "http://www.imdb.com/title/tt0025968/"
}
],
@@ -417,7 +422,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#All-Seeing Eye #Punchcard #Big-Data #Surveillance #Germany #Fascism #Computing #World War II #Identification",
- "description": "This poster advertised Hollerith punchcard technology from IBMs German subsidiary DEHOMAG (Deutsche Hollerith Maschinen Gesellschaft). The english translation is, ‘See everything with Hollerith punchcards‘. This early computing system was used by Nazi Germany to track and identify jews and other minorities and ultimately helped facilitate the Holocaust.\r\n",
+ "description": "This poster advertised Hollerith punchcard technology from IBM's German subsidiary DEHOMAG (Deutsche Hollerith Maschinen Gesellschaft). The English translation is, <i>See everything with Hollerith punchcards</i>. This early computing system was used by Nazi Germany to track and identify Jews and other minorities and ultimately helped facilitate the Holocaust.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/6b9f0dd0-3657-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -427,11 +432,11 @@ export const backupDB = {
"credit": "Edwin Black in IBM and the Holocaust / 2001\r\n",
"links": [
{
- "text": "Link text",
+ "text": "Jewish Virtual Library",
"uri": "http://www.jewishvirtuallibrary.org/ibm-and-quot-death-s-calculator-quot"
},
{
- "text": "Link text ",
+ "text": "NY Times",
"uri": "http://www.nytimes.com/books/first/b/black-ibm.html"
}
],
@@ -446,7 +451,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#USA #All-Seeing Eye #Governments\r\n",
- "description": "The all seeing-eye of God famously appears on the reverse of the US one dollar bill. Atop a unfinished thirteen steps pyramid and surrounded by rays of light, it is part of the symbolism of the Great Seal of the United States. The usage of the eye in the seal dates back as far as 1782. The all-seeing Eye or the Eye of Providence is often interpreted as representing the eye of God keeping a watch over humankind. Often utilized by the Freemasons, the design of the one-dollar bill was subject to several conspiracy theories.\r\nSurrounding the eye and pyramid are the latin phrases “Annuit Cœptis\", meaning \"He approves (or has approved) our undertakings“ and \"Novus Ordo Seclorum,\" meaning \"New Order of the Ages“. In 1957 the phrase „In God We Trust“ was added, which makes the design that is still in use today.\r\nThe image depicts former President Franklin D. Roosevelt approving the design with the condition that the order of the seal should be reversed so the phrase \"of the United States\" would be under the obverse side of the Seal.\r\n",
+ "description": "The All-Seeing Eye of God famously appears on the reverse of the US $1 dollar bill. Atop an unfinished thirteen step pyramid and surrounded by rays of light, it is part of the symbolism of the Great Seal of the United States. The usage of the Eye on the seal dates back to 1782. The All-Seeing Eye or the Eye of Providence is often interpreted as representing the eye of God keeping watch over humankind, and was often utilized by the Freemasons. As a result, the design of the one-dollar bill has been subject to several conspiracy theories.\r\n\r\nSurrounding the eye and pyramid are the latin phrases \"Annuit Cœptis\", meaning \"He approves (or has approved) our undertakings\" and \"Novus Ordo Seclorum,\" meaning \"New Order of the Ages\". In 1957 the phrase \"In God We Trust\" was added, which completes the design in use today.\r\n\r\nThe image depicts former President Franklin D. Roosevelt approving the design with the condition that the order of the seal should be reversed so the phrase \"of the United States\" would be under the obverse of the Seal.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/305885b0-38c5-11e7-9d48-c59d5d130bc6.jpg",
"caption": "",
@@ -456,7 +461,7 @@ export const backupDB = {
"credit": "public domain, 1935\r\n",
"links": [
{
- "text": "Link text ",
+ "text": "US Currency.gov",
"uri": "https://www.uscurrency.gov/content/history-american-currency"
}
],
@@ -471,7 +476,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#Turing-Machine #Computing #Encryption #Computer-Science #Warfare #Espionage #Codebreaking #Intelligence #Enigma \r\n",
- "description": "A Turing machine is a hypothetical machine thought of by the mathematician Alan Turing in 1936. Despite its simplicity, it can simulate any algorithm. The Turing machine is considered as the first mathematical model of computation and therefore also the blueprint for the modern computer. Its prior usage in the time of its development was to break a supposedly unbreakable encryption system called “Enigma”, which the Nazis depevolpped and applied during World War II.\r\n",
+ "description": "A Turing machine is a hypothetical machine conceived of by the mathematician Alan Turing in 1936. Despite its simplicity, it can simulate any algorithm. The Turing machine is considered as the first mathematical model of computation and therefore is the blueprint for the modern computer. It was used at the time of its development to break a supposedly unbreakable encryption system called “Enigma”, which the Nazis developed and applied during World War II.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/95eeb300-3658-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -481,12 +486,12 @@ export const backupDB = {
"credit": "",
"links": [
{
- "text": "Link text",
+ "text": "New Yorker",
"uri": "http://www.newyorker.com/magazine/2006/02/06/code-breaker"
},
{
- "text": "Link text",
- "uri": " https://www.cl.cam.ac.uk/projects/raspberrypi/tutorials/turing-machine/one.html"
+ "text": "Introduction",
+ "uri": "https://www.cl.cam.ac.uk/projects/raspberrypi/tutorials/turing-machine/one.html"
}
],
"disabled": false,
@@ -500,7 +505,7 @@ export const backupDB = {
"medium": "Image",
"category": "Surveillance",
"keywords": "#Animal Kingdom #Spy #World War II #All-Seeing Eye #Aerial Surveillance #Photography #Warfare #Technology\r\n",
- "description": "Originated by Julius Neubronners in 1907, pigeons outfitted with cameras were instrumental in early aerial photography. Pigeon based espionage was commonly used in World War II by Great Britain, Germany and the US. Later, the CIA used pigeons for top secret reconnaissance missions.\r\n",
+ "description": "Originated by Julius Neubronners in 1907, pigeons outfitted with cameras were instrumental in early aerial photography. Pigeon-based espionage was commonly used in World War II by Great Britain, Germany and the US. Later, the CIA used pigeons for top secret reconnaissance missions.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/1edb3b10-365a-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -510,11 +515,11 @@ export const backupDB = {
"credit": "AR/BNPS\r\n",
"links": [
{
- "text": "Link text",
+ "text": "Audubon Society",
"uri": "http://www.audubon.org/news/eyes-sky-short-history-bird-spies"
},
{
- "text": "Link text",
+ "text": "Royal Pigeon Racing Assn.",
"uri": "http://www.rpra.org/pigeon-history/pigeons-in-war/"
}
],
@@ -529,7 +534,7 @@ export const backupDB = {
"medium": "Political Agreement",
"category": "Surveillance",
"keywords": "#Surveillance #Control #Governments #FiveEyes #Big Brother #Espionage #Intelligence #Information #NSA #Politics #Pentagon #Secrets #Secret Service #Signals\r\n",
- "description": "The Five Eyes alliance is a secret surveillance arrangement comprising Australia, Canada, New Zealand, United Kingdom and the United States of America. It originated as early as 1946 with a series of bilateral agreements that became known as the UKUSA agreement with the goal of sharing intelligence, primarily signal intelligence (aka SIGINT) between the members. Since the Cold War the alliance has been building a global surveillance infrastructure to spy on the world’s communication with an emphasis placed on monitoring the World Wide Web since the US has called out a \"war on terror\" in 2001.\r\n",
+ "description": "The Five Eyes alliance is a secret surveillance arrangement comprising Australia, Canada, New Zealand, United Kingdom and the United States of America. It originated as early as 1946 with a series of bilateral agreements that became known as the UKUSA agreement, with the goal of sharing intelligence, primarily signal intelligence (aka SIGINT) between the members. Since the Cold War, the alliance has been building a global surveillance infrastructure to spy on the world’s communications, with an emphasis placed on monitoring the World Wide Web since the US declared its \"war on terror\" in 2001.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/6d6176f0-365a-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -539,7 +544,7 @@ export const backupDB = {
"credit": "Cover of the UKUSA Agreement 1946, Public Domain\r\n",
"links": [
{
- "text": "Link text ",
+ "text": "Privacy Intl.",
"uri": "https://www.privacyinternational.org/node/51"
}
],
@@ -554,7 +559,7 @@ export const backupDB = {
"medium": "Program",
"category": "Surveillance",
"keywords": "#Moon #Surveillance #Interception #Signal #Covert Operations #Cold-War #Conspiracy #Espionage #Governments #Information #Radar #Antenna #Technology\r\n",
- "description": "Moonbounce describes the phenomenon that man-made signals emanating from Earth would bounced back from the moon and detected from other locations. The radar-reflective characteristics of the lunar surface were already successfully tested since 1946. One time in surveillance history this came to use was in the US-Air Force led project named FLOWER GARDEN in the early 1960s to monitor and intercept radar signals from the Soviet Union. Several antennas around the US were used for moonbounce – also operated by the CIA and the NSA.\r\n",
+ "description": "Moonbounce describes the phenomenon that man-made signals emanating from Earth would bounce back from the moon and could be detected from other locations. The radar-reflective characteristics of the lunar surface were successfully tested in 1946. This phenomenon was used in the early 1960s in a US Air Force project, codenamed FLOWER GARDEN, to monitor and intercept radar signals from the Soviet Union. Several antennas around the US were used for moonbounce – also operated by the CIA and the NSA.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b0a50210-365a-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -564,7 +569,7 @@ export const backupDB = {
"credit": "NASA, 1969\r\n",
"links": [
{
- "text": "Link text ",
+ "text": "National Security Archive",
"uri": "http://nsarchive.gwu.edu/NSAEBB/NSAEBB479/"
}
],
@@ -579,7 +584,7 @@ export const backupDB = {
"medium": "Book",
"category": "Surveillance",
"keywords": "#Dystopia #Big Brother #All-Seeing Eye #Literature #Control\r\n",
- "description": "George Orwell’s Nineteen Eighty-Four is the most well-known cultural expression of fear of surveillance and a powerful metaphor for the totalitarian potentials of any bureaucratic state. Evocations of a menacing “Big Brother” have become commonplace in discussions about surveillance and control, and so have debates about whether or not Orwell was “right” in his predictions as portrayed in the book.\r\n",
+ "description": "George Orwell’s <i>Nineteen Eighty-Four</i> is the most well-known cultural expression of fear of surveillance and a powerful metaphor for the totalitarian potentials of any bureaucratic state. Evocations of a menacing “Big Brother” have become commonplace in discussions about surveillance and control, and so have debates about whether or not Orwell was “right” in his predictions as portrayed in the book.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/1127e300-365b-11e7-a37a-4579121b15f0.jpg",
"caption": "Quotes: \r\n– “Who controls the past controls the future. Who controls the present controls the past.”\r\n– “The best books... are those that tell you what you know already”\r\n\r\n",
@@ -609,7 +614,7 @@ export const backupDB = {
"credit": "© Simon Menner and BStU 2017",
"links": [
{
- "text": "Link text",
+ "text": "Simon Menner",
"uri": "https://simonmenner.com/_sites/SurveillanceComplex/StasiImages/_StasiImagesMenue.html#"
}
],
@@ -644,7 +649,7 @@ export const backupDB = {
"medium": "Film",
"category": "Surveillance",
"keywords": "#Film #Watching #Investigation #Surveillance #Camera #Architecture #Evidence #Photography #Public #Private\r\n",
- "description": "Alfred Hitchcock‘s ‘Rear Window’ tells the story of a photojournalist who is confined to his New York City apartment after suffering an injury. While observing the daily life of his neighbours through the rear window, he suspects a man across the courtyard committed murder to his wife. Bound to his wheelchair, he enlists the help of his fashionable high-society girlfriend and his visiting nurse to investigate.\r\nThe movie addresses issues of the private and public in a tense, urban architecture. While the neighbours are visible to the protagonist, he is not being seen by them until the moment he draws attention to the suspected murderer who then attempts to kill him.\r\n",
+ "description": "Alfred Hitchcock‘s ‘Rear Window’ tells the story of a photojournalist who is confined to his New York City apartment after suffering an injury. While observing the daily life of his neighbours through the rear window, he suspects that the man across the courtyard murdered his wife. Bound to his wheelchair, he enlists the help of his fashionable high-society girlfriend and his visiting nurse to investigate.\r\n\r\nThe movie addresses issues of the private and public in a tense, urban architecture. While the neighbours are visible to the protagonist, his surveillance goes unseen until the moment he draws attention to the suspected murderer, who then attempts to kill him.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f54cd0c0-365d-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -654,11 +659,7 @@ export const backupDB = {
"credit": "screenshot\r\n",
"links": [
{
- "text": "Link text",
- "uri": "http://www.academia.edu/305175/Surveillance_and_Ethics_In_Film_Rear_Window_and_The_Conversation"
- },
- {
- "text": "Link text",
+ "text": "The Guardian",
"uri": "https://www.theguardian.com/film/filmblog/2012/jul/25/my-favourite-hitchcock-rear-window"
}
],
@@ -673,7 +674,7 @@ export const backupDB = {
"medium": "Image",
"category": "Surveillance",
"keywords": "#Animal Kingdom #Cold-War #Espionage #CIA #Bug #Intelligence #Technology #Device\r\n",
- "description": "In the 1960’s the CIA experimented with live cats as eavesdropping devices to spy on America’s cold war rivals. In the operation known as “Acoustic Kitty”, a cat was surgical accommodated with electronic spying equipment: a microphone in the cat’s ear canal, a radio transmitter and an antenna wire along its spine and tail. It was even possible to direct it with ultrasonic sound. The first test to spy on a conversation of two people on a park bench was a failure, as the cat was run over by a taxi almost immediately after released out of the CIA researchers van. The project took 5 years in development and cost $15 million.\r\n",
+ "description": "In the 1960s the CIA experimented with live cats as eavesdropping devices to spy on America’s cold war rivals. In the operation known as “Acoustic Kitty”, a cat was surgical accommodated with electronic spying equipment: a microphone in the cat’s ear canal, a radio transmitter and an antenna wire along its spine and tail. It was even possible to direct it with ultrasonic sound. The first test to spy on a conversation of two people on a park bench was a failure, as the cat was run over by a taxi almost immediately after released out of the CIA researchers van. The project took 5 years in development and cost $15 million.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/493c6510-365e-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -683,16 +684,12 @@ export const backupDB = {
"credit": "unknown\r\n",
"links": [
{
- "text": "Link text ",
+ "text": "The Guardian",
"uri": "https://www.theguardian.com/world/2001/sep/11/worlddispatch"
},
{
- "text": "Link text ",
+ "text": "National Security Archive",
"uri": "https://nsarchive.wordpress.com/2010/03/05/document-friday-acoustic-kitty/"
- },
- {
- "text": "Link text ",
- "uri": "http://nsarchive.gwu.edu/NSAEBB/NSAEBB54/st27.pdf"
}
],
"disabled": false,
@@ -716,11 +713,11 @@ export const backupDB = {
"credit": "Courtesy: NRO / Public Domain",
"links": [
{
- "text": "Link text",
+ "text": "NRO",
"uri": "http://www.nro.gov/history/csnr/corona/factsheet.html"
},
{
- "text": "Link text",
+ "text": "Wikipedia",
"uri": "https://en.wikipedia.org/wiki/Corona_(satellite)#Declassification"
}
],
@@ -742,10 +739,10 @@ export const backupDB = {
"width": "441",
"height": "517"
},
- "credit": "public domain / screenshot from document (link below)\r\n",
+ "credit": "",
"links": [
{
- "text": "Link text",
+ "text": "Original Study",
"uri": "https://archive.org/details/firstfacialrecognitionresearch"
}
],
@@ -760,7 +757,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#NSA #Surveillance #Covert Operations #Cold-War #Espionage #Fascism #Germany #Governments #Interception #Intelligence #Signal #Information #War #Geography #Architecture #Radome #Radar #Antenna #Technology\r\n",
- "description": "Teufelsberg (translated as “devil’s hill”) is a man-made hill in Berlin. Built on top of a unfinished Nazi military-technical college, it was created in the 20 years following World War II by moving debris from the destroyed city of Berlin. In 1963 the NSA built a permanent listening station atop the mountain to spy on the eastern Allies. The Field Station had four radomes containing large satellite antennas. With the most sophisticated spying equipment for that time, they enabled the US and British intelligence to intercept satellite signals, radio waves, microwave links and other transmissions. This unique history makes Teufelsberg a tourist attraction.\r\n",
+ "description": "Teufelsberg (translated as “devil’s hill”) is a man-made hill in Berlin. Built on top of a unfinished Nazi military-technical college, it was formed in the 20 years following World War II from debris cleared from the destroyed city of Berlin. In 1963 the NSA built a permanent listening station atop the mountain, to spy on its eastern Allies. The Field Station had four radomes containing large satellite antennas. With the most sophisticated spying equipment for that time, they enabled US and British intelligence to intercept satellite signals, radio waves, microwave links and other transmissions. This unique history makes Teufelsberg a tourist attraction.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/617c4070-3661-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -770,7 +767,7 @@ export const backupDB = {
"credit": "US Army Intelligence & Security Command\r\n",
"links": [
{
- "text": "Link text",
+ "text": "Deutsche Welle",
"uri": "http://www.dw.com/en/teufelsberg-mirrors-berlins-dramatic-history/a-17074597"
}
],
@@ -785,7 +782,7 @@ export const backupDB = {
"medium": "Film",
"category": "Surveillance",
"keywords": "#Espionage #Camera #Film #Evidence #Photography #Arts #Surveillance #Watching #Conspiracy\r\n",
- "description": "In the legendary 1960s movie „Blow Up“ a London fashion photographer unwittingly captures a crime in a park. In the scene the title is taken from, he blows up the photograph that becomes blurry evidence of the murder. While he starts investigating, the camera becomes a leading role in the narration while addressing issues of reality, illusion and conspiracy.\r\n",
+ "description": "In the legendary 1960s movie <i>Blow Up</i>, a London fashion photographer unwittingly captures a crime in a park. In the title scene, he blows up the photograph and finds blurry evidence of the murder. When he starts investigating, the camera assumes a leading role in the narrative, addressing issues of reality, illusion and conspiracy.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9ab4b070-3661-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -795,7 +792,7 @@ export const backupDB = {
"credit": "unknown\r\n",
"links": [
{
- "text": "Link text",
+ "text": "The Guardian",
"uri": "https://www.theguardian.com/film/2017/mar/10/antonioni-blow-up-50-years-movie-photographer-murder"
}
],
@@ -810,7 +807,7 @@ export const backupDB = {
"medium": "Program",
"category": "Surveillance",
"keywords": "#Espionage #Surveillance #Spy Satellite #Top-Secret #Cold-War #Big Brother #Governments #Intelligence #NSA #FiveEyes #Privacy #Snowden #Whistleblowing #Police State #Civil Rights #Interception #Radome #Technology\r\n",
- "description": "ECHELON is the codename given to a secret international electronic eavesdropping network run by the Five Eyes Alliance. Created in 1966 its aim was to spy on diplomatic and military communication during the Cold War by intercepting satellites. By the end of the 20th century civil right groups and privacy advocates believe it was the first-ever automated, global, mass surveillance program, spanning much further than intercepting satellites, but literally listening to everybody. It would capture all communication traffic and run it through a content-sensitive dictionaries of keywords or anything intelligence services deem to be “suspicious.”\r\nAlthought the NSA and the GCHQ denied the existence of ECHELON, the European Parliament launched an investigation in 1999. Internal reports, disclosed by Edward Snowden confirmed ECHELONS existence.\r\n",
+ "description": "ECHELON is the codename given to a secret international electronic eavesdropping network run by the Five Eyes Alliance. Created in 1966, its aim was to spy on diplomatic and military communication during the Cold War by intercepting satellites. By the end of the 20th century, civil right groups and privacy advocates believe it had become the first-ever automated, global, mass surveillance program, spanning much further than intercepting satellites, but literally listening to everybody. Echelon captured all communication traffic and ran it through content-sensitive dictionaries of keywords - anything intelligence services deem to be “suspicious.”\r\n\r\nAlthough the NSA and the GCHQ denied the existence of ECHELON, the European Parliament launched an investigation in 1999. Internal reports, disclosed by Edward Snowden confirmed ECHELON's existence.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/d9a13d80-3661-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -820,19 +817,19 @@ export const backupDB = {
"credit": "First ECHELON station intercepting Intelsat Atlantic and Indian Ocean area satellites: Bude, Cornwal.",
"links": [
{
- "text": "Link text",
+ "text": "First Look",
"uri": "https://firstlook.org/wp-uploads/sites/1/2015/07/rexusa_2569089a-1024x428.jpg"
},
{
- "text": "Link text",
+ "text": "The Intercept",
"uri": "https://theintercept.com/2015/08/03/life-unmasking-british-eavesdroppers/"
},
{
- "text": "Link text",
+ "text": "EU Parliament",
"uri": "http://www.europarl.europa.eu/sides/getDoc.do?type=REPORT&reference=A5-2001-0264&format=XML&language=EN"
},
{
- "text": "Link text",
+ "text": "Der Spiegel",
"uri": "http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135-2.html"
}
],
@@ -847,7 +844,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#Internet #Network #Big Data #Computing #Digital Rights #Metadata #Net Politics\r\n",
- "description": "The origins of the Internet date back to the 1960s when the US-federal government commissioned research to develop more robust and efficient communication via computer networks. It is an interconnected network that consists of private, public, academic, business, and government networks from local to a global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an extensive range of information resources and services. The vast majority of today’s computer surveillance involves the monitoring of data and traffic on the Internet.\r\n",
+ "description": "The origins of the Internet date back to the 1960s, when the US federal government commissioned research to develop more robust and efficient communication via computer networks. The Internet is an interconnected network that consists of private, public, academic, business, and government networks from local to a global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an extensive range of information resources and services. The vast majority of today’s computer surveillance involves the monitoring of data and traffic on the Internet.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/464a9f80-3662-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -857,7 +854,7 @@ export const backupDB = {
"credit": "The Opte Project, Internet Map 2003, (This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License) © 2014 by LyonLabs, LLC and Barrett Lyon\r\n",
"links": [
{
- "text": "Link text",
+ "text": "Internet Society",
"uri": "http://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet#"
}
],
@@ -872,7 +869,7 @@ export const backupDB = {
"medium": "Item",
"category": "Drones",
"keywords": "#CIA #Animal Kingdom #Drone #Bug #Espionage #Robot #UAV #Intelligence #Technology #Device\r\n",
- "description": "In the 1970s the CIA built a prototype for miniature UAVs (Unmanned Aerial Vehicles) for collecting intelligence in the form of a dragonfly. The insectothopter, as they called it, was a robotic dragonfly that functioned as a audio bug. It was powered by a motor, propelled by a small amount of gas and guided by a laser beam in the rear of the dragonfly-drone. A watchmaker adapted the UAV to the actual scale size of a real dragonfly. After the insectothopter proved too unstable in crosswinds, the project was abandoned.\r\n",
+ "description": "In the 1970s, the CIA built a prototype for miniature UAVs (Unmanned Aerial Vehicles) for collecting intelligence in the form of a dragonfly. The insectothopter, as they called it, was a robotic dragonfly that functioned as a audio bug. It was powered by a motor, propelled by a small amount of gas and guided by a laser beam in the rear of the dragonfly-drone. A watchmaker adapted the UAV to the actual scale size of a real dragonfly. After the insectothopter proved too unstable in crosswinds, the project was abandoned.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/8d80c190-3662-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -882,11 +879,11 @@ export const backupDB = {
"credit": "CIA\r\n",
"links": [
{
- "text": "Link text",
+ "text": "CIA",
"uri": "https://www.cia.gov/library/video-center/video-transcripts/insectothopter-the-bug-carrying-bug.html"
},
{
- "text": "Link text",
+ "text": "Atlas Obscura",
"uri": "http://www.atlasobscura.com/articles/object-of-intrigue-the-cia-s-dragonfly-drone"
}
],
@@ -901,7 +898,7 @@ export const backupDB = {
"medium": "Film",
"category": "Surveillance",
"keywords": "#Surveillance #Camera #Drugs #Emotions #Android #Police #Computers #Film\r\n",
- "description": "With the spread of surveillance camera technology in public spaces, as well as the rising significance of computers and databases in the late 1960s, more films became concerned with the prospect of living in a world of pervasive surveillance. THX 1138, George Lucas’ remake of his own short “Electronic Labyrinth: THX 1138 4EB” (1967), is one of those early reactions to an increasingly surveilled society. It shows a dystopian future in which total control over society is exercised by computers, surveillance cameras, and android police officers. Conformity and homogeneity are a basic rule. THX 1138, a factory worker who produces android police officers, is given a glimpse into the other side through his computer matched and assigned female roommate, LUH 3417 and her surveillance colleague. \r\n",
+ "description": "With the spread of surveillance camera technology in public spaces, as well as the rising significance of computers and databases in the late 1960s, more films became concerned with the prospect of living in a world of pervasive surveillance. <i>THX 1138</i>, George Lucas’ remake of his short film <i>Electronic Labyrinth: THX 1138 4EB</i> (1967), is one of those early reactions to an increasingly surveilled society. It shows a dystopian future in which total control over society is exercised by computers, surveillance cameras, and android police officers. Conformity and homogeneity are a basic rule. THX 1138 is a factory worker who produces android police officers, is given a glimpse into the other side through his computer matched and assigned female roommate, LUH 3417 and her surveillance colleague.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e0127390-3662-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -911,15 +908,15 @@ export const backupDB = {
"credit": "",
"links": [
{
- "text": "Link text",
+ "text": "Original Short",
"uri": "https://www.youtube.com/watch?v=ihpU1RE_AhA"
},
{
- "text": "Link text",
+ "text": "Wikipedia",
"uri": "https://en.wikipedia.org/wiki/THX_1138"
},
{
- "text": "Link text",
+ "text": "IMDB",
"uri": "http://www.imdb.com/title/tt0066434/"
}
],
@@ -934,14 +931,14 @@ export const backupDB = {
"medium": "Song",
"category": "Surveillance",
"keywords": "#Surveillance #All-Seeing Eye #Big Brother #Control #Dystopia #Privacy #Totalitarianism #Music\r\n",
- "description": "Stevie Wonders studio album Talking Book, which was released in 1972 includes the song „Big Brother“. The song is a serene composed electro-folk ballad in protest against the Nixon presidency and its surveillance culture. It features the lyrics: Your name is big brother / You say that you're watching me on the tele / Seeing me go nowhere / Your name is big brother / You say that you're tired of me protesting / Children dying everyday / My name is nobody / But I can't wait to see your face inside my door ooh\r\n",
+ "description": "Stevie Wonder's studio album <i>Talking Book</i>, which was released in 1972, includes the song \"Big Brother\". The song is a serene composed electro-folk ballad in protest against the Nixon presidency and its surveillance culture. It features the lyrics: <i>Your name is big brother / You say that you're watching me on the tele / Seeing me go nowhere / Your name is big brother / You say that you're tired of me protesting / Children dying everyday / My name is nobody / But I can't wait to see your face inside my door ooh</i>\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/75d62da0-36e9-11e7-a37a-4579121b15f0.jpg",
"caption": "",
"width": "640",
"height": "640"
},
- "credit": "Motown Records (needs recheck)",
+ "credit": "Motown Records / Tamla Records",
"disabled": false,
"__index": 41,
"dateCreated": "Fri, 12 May 2017 08:05:15 GMT",
@@ -954,7 +951,7 @@ export const backupDB = {
"medium": "Image",
"category": "Surveillance",
"keywords": "#Verticality #NASA #Photography\r\n",
- "description": "The famous photo taken from by the Apollo 17 crew on December 7th, 1972 on their way to the moon, is the first image to show the full earth disc. It was taken from a distance of 28,000 miles (45,000 km), and changed the way we look at our planet. It marks the shift of perspective – from horizontal to vertical – similar to the gods perspective.\r\n",
+ "description": "This famous photo taken by the Apollo 17 crew on December 7th, 1972, on their way to the moon, is the first image to show the full disc of the Earth. It was taken from a distance of 28,000 miles (45,000 km), and changed the way we look at our planet. It marks the shift of perspective – from horizontal to vertical – similar to the god's eye perspective.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e772f4c0-36e9-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -964,7 +961,7 @@ export const backupDB = {
"credit": "NASA / Public Domain, 1972\r\n",
"links": [
{
- "text": "Link text",
+ "text": "Earth Observatory",
"uri": "https://earthobservatory.nasa.gov/Features/BlueMarble/BlueMarble_history.php"
}
],
@@ -979,7 +976,7 @@ export const backupDB = {
"medium": "Film",
"category": "Surveillance",
"keywords": "#Wire Tapping #Surveillance #Deception #Bugs \r\n",
- "description": "The Conversation assigns its central character a remarkable role. Even though Harry Caul is portrayed as a leading audio surveillance expert, he fails to understand the meaning of his secret recordings and ends up trapped in a net of deception. In the last scene of the film, Caul destroys his apartment in a frustrated and unsuccessful attempt to locate the bug that was planted in his home.\r\n\r\n",
+ "description": "<i>The Conversation</i> assigns its central character a remarkable role. Even though Harry Caul is portrayed as a leading audio surveillance expert, he fails to understand the meaning of his secret recordings and ends up trapped in a net of deception. In the final scene of the film, Caul destroys his apartment in a frustrated and unsuccessful attempt to locate the bug that was planted in his home.\r\n\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/1a7bd890-4771-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
@@ -1008,7 +1005,7 @@ export const backupDB = {
"medium": "Song",
"category": "Surveillance",
"keywords": "#Surveillance #Spy-Satellite #All-Seeing Eye #Big Brother #Control #Dystopia #Privacy #Totalitarianism #Verticality #Music\r\n",
- "description": "In 1982 the heavy metal band Judas Priest released their album Screaming for Vengeance which features the song “Electric Eyes”. It is seen as an allusion to George Orwells mass surveillance themed 1984 of the all-seeing eye of a government one can not escape. It particular, the song refers to spy-satellites. An excerpt of the lyrics reads: Up here in space / I'm looking down on you / My lasers trace / Everything you do / You think you've private lives / Think nothing of the kind / There is no true escape / I'm watching all the time.\r\n",
+ "description": "In 1982, the heavy metal band Judas Priest released their album <i>Screaming for Vengeance<i> which features the song “Electric Eyes”. It is seen as an allusion to George Orwell's mass-surveillance themed <i>1984</i> and the all-seeing eye of a government one can not escape. It particular, the song refers to spy-satellites. An excerpt of the lyrics reads: <i>Up here in space / I'm looking down on you / My lasers trace / Everything you do / You think you've private lives / Think nothing of the kind / There is no true escape / I'm watching all the time.</i>",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b3dc9910-36ec-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1033,7 +1030,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#Surveillance #Germany #Scent #Stasi #GDR #Identification",
- "description": "The Stasi (Former GDR Ministry of State Security) applied a whole range of methods and means to try to track down suspects or critics of the East German communist regime. Collecting scent samples was used to try to identify those, for example, who had distributed flyers or who critical graffiti. The samples were stored in an olfactory database\r\n",
+ "description": "The Stasi (Former GDR Ministry of State Security) applied a whole range of methods and means to try to track down suspects or critics of the East German communist regime. Collecting scent samples was used to try to identify those, for example, who had distributed flyers or made critical graffiti. The samples were stored in an olfactory database.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e5779290-36ec-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1087,7 +1084,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#CIA #Animal Kingdom #Espionage #Robot #Intelligence #Technology\r\n",
- "description": "In the 1990s the CIA’s Directorate of Science and Technology developed a remote spying robot catfish named Charlie. The UUV (Unmanned Underwater Vehicle) fish contained a “pressure hull, ballast system, and communications system in the body and a propulsion system in the tail.“ It was used to collect intelligence and supposedly water samples near suspected chemical and nuclear plants. A problem the CIA was facing with the aquatic robot was its resemblance to a real catfish – “predators would stalk and dine of the spy gadget.“ \r\n",
+ "description": "In the 1990s the CIA’s Directorate of Science and Technology developed a remote spying robot catfish named Charlie. The UUV (Unmanned Underwater Vehicle) fish contained a “pressure hull, ballast system, and communications system in the body and a propulsion system in the tail.“ It was used to collect intelligence and supposedly water samples near suspected chemical and nuclear plants. A problem the CIA was facing with the aquatic robot was its resemblance to a real catfish – “predators would stalk and dine on the spy gadget.“ \r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9ca35b70-36ed-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1116,7 +1113,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#Radio Waves #Weather #Ionosphere #Surveillance #US Air-Force #Radio communications #Conspiracy\r\n",
- "description": "HAARP (High Frequency Active Auroral Research Program) is a former US-military program that focuses on ionospheric research. Its official purpose was to analyze the ionosphere and investigate potentials for developing ionospheric enhancement technology for radio communications and surveillance. HAARP has repeatedly been the target of conspiracy theorists, who claim that it was capable of \"weaponizing\" weather, thus triggering natural catastrophes like floods, hurricanes, droughts or earthquakes.\r\n",
+ "description": "HAARP (High Frequency Active Auroral Research Program) is a former US-military program that focuses on ionospheric research. Its official purpose was to analyze the ionosphere and investigate potentials for developing ionospheric enhancement technology for radio communications and surveillance. HAARP has repeatedly been the target of conspiracy theorists, who claim that it was capable of \"weaponizing\" weather, somehow triggering natural catastrophes like floods, hurricanes, droughts or earthquakes.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e357f170-36ed-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1141,7 +1138,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#Evidence #Technology #Secrets #Transparency #Disclosure #X-Ray\r\n",
- "description": "In 1996 the human remains of a 1000 year old monk were found inside a Buddha statue when a private collector brought it for restoration in the Netherlands. The monk who lived in the Song Dynasty practised self-mummification to prepare for life after death. His mummy was exhibited and worshipped in a monastery for the first 200 years until being placed inside the statue. It was not until 2015 when the statue underwent a 3-D X-Ray scan that revealed the full skeleton of the monk which organs have been removed and replaced with ancient wads of paper printed with Chinese characters. It is yet unclear how the statue made its way to Europe.\r\n\r\n",
+ "description": "In 1996 the human remains of a 1000-year-old monk were found inside a Buddha statue, when a private collector brought it for restoration in the Netherlands. The monk, who lived in the Song Dynasty, practiced self-mummification to prepare for life after death. His mummy was exhibited and worshipped in a monastery for 200 years before being placed inside the statue. It was not until 2015, when the statue underwent a 3D X-ray scan that revealed the full skeleton of the monk. Its organs had been removed and replaced with ancient wads of paper printed with Chinese characters. It is yet unclear how the statue made its way to Europe.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f0641030-36f0-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1166,7 +1163,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#The Internet #Cencorship #Control #Governments #Algorithm #Digital Rights #Net Politics #Freedom #Information #Access \r\n",
- "description": "The term Great Firewall of China is the name given to the Chinese government internet censorship and surveillance program. Being a major part of the Golden Shield Project it blocks unwanted data from foreign countries coming into China to gain regulation and control of the Internet. Operated by the government of Mainland China, the idea originated by the former paramount leader of the People’s Republic of China, Deng Xiaoping, who said: ‘If you open the window for fresh air, you have to expect some flies to blow in’. He metaphorically refers to western values, such as democracy of freedom of expression, as ‘flies‘ that are in conflict with the ideologies of the Communist Party. Thus, when the Internet arrived in China in 1994 and Chinese leadership had to open access to to the public, actions had to be undertaken to prevent western values to enter the country.\r\n",
+ "description": "The term Great Firewall of China is the name given to the Chinese government internet censorship and surveillance program. Being a major part of the Golden Shield Project, it blocks unwanted data from foreign countries entering China to gain regulation and control of the Internet. Operated by the government of Mainland China, the idea originated by the former paramount leader of the People’s Republic of China, Deng Xiaoping, who said: <i>\"If you open the window for fresh air, you have to expect some flies to blow in.\"</i> He metaphorically refers to western values, such as democracy of freedom of expression, as ‘flies‘ that are in conflict with the ideologies of the Communist Party. Thus, when the Internet arrived in China in 1994 and Chinese leadership had to open access to to the public, actions had to be undertaken to prevent western values from entering the country.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/82490050-36f1-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1191,7 +1188,7 @@ export const backupDB = {
"medium": "TV Show",
"category": "Surveillance",
"keywords": "#Big Brother #surveillance #CCTV #entertainment #observation \r\n",
- "description": "Big Brother is a reality TV show franchise created by John de Mol. As of 11 November 2016, there have been 387 seasons of Big Brother in over 54 franchise countries and regions. In the show, contestants called \"housemates\" live in a specially-constructed house, isolated from the outside world. Housemates are voted out until only one remains and wins the cash prize. During their stay in the house, contestants are put under constant observation – they’re continuously monitored by live CCTV cameras as well as personal audio microphones. Taking its name from George Orwell’s Nineteen Eighty-Four, Big Brother evokes surveillance as its central theme while ironically denying the dystopian undertones. \r\n",
+ "description": "Big Brother is a reality TV show franchise created by John de Mol. As of 11 November 2016, there have been 387 seasons of Big Brother in over 54 franchise countries and regions. In the show, contestants called \"housemates\" live in a specially-constructed house, isolated from the outside world. Housemates are voted out until only one remains and wins the cash prize. During their stay in the house, contestants are put under constant observation – they're continuously monitored by live CCTV cameras as well as personal audio microphones. Taking its name from George Orwell’s <i>Nineteen Eighty-Four</i>, Big Brother evokes surveillance as its central theme while ironically denying the dystopian undertones. \r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b4db0400-36f1-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1216,7 +1213,7 @@ export const backupDB = {
"medium": "Historic Event",
"category": "Surveillance",
"keywords": "#9/11 #War on Terror #Airplane #CCTV #Attack #War #Morality #Politics #Pentagon #Terrorism\r\n",
- "description": "The CCTV image shows terrorist ringleaders Mohamed Atta and Abdulaziz al-Omari passing through security checkpoint at Portland, Maine before flying to Boston, where they hijacked American Airlines Flight 11 that crashed into the North Tower of the World Trade Center on the morning of September 11th 2001.\r\nFollowing the attacks, former US-President George W. Bush declared a „war on terror“ on September 20th 2001 in a speech to the US Congress. Since then, the term is used to describe the international military campaign that was started after the historic attacks.\r\nThe events of 9/11 changed the landscape of surveillance technology significantly.\r\n",
+ "description": "This CCTV image shows terrorist ringleaders Mohamed Atta and Abdulaziz al-Omari passing through a security checkpoint in Portland, Maine, before flying to Boston, where they hijacked American Airlines Flight 11 which crashed into the North Tower of the World Trade Center on the morning of September 11th, 2001.\r\n\r\nFollowing the attacks, former US President George W. Bush declared a \"war on terror\" in a speech to the US Congress on September 20th. Since then, the term is used to describe the international military campaign that was started after the historic attacks.\r\n\r\nThe events of 9/11 changed the landscape of surveillance technology significantly.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/67aa2980-36f2-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1245,14 +1242,14 @@ export const backupDB = {
"medium": "Image",
"category": "Surveillance",
"keywords": "#Drone #UAV #Airstrike #US-Army #War on Terror #Weapons #Classified #Airplanes\r\n",
- "description": "On 7th of October 2001, the first day of the US-led war in Afghanistan, an armed, CIA-controlled predator drone was following the Taliban leader Mullah Omar in Kandahar. Due to communication problems, the drone, remotely controlled from the agency‘s headquarters in Langley, Virginia, fired a hellfire missile on a truck outside the building with Omar, allegedly killing two of his bodyguards. The Taliban leader escaped during the chaos following the airstrike. This event marks the first time a modern drone had killed a human being.\r\nThe General Atomics Aeronautical MQ-1L Predator No. 3034 which executed the mission is on display at the Smithsonian National Air and Space Museum in D.C. Washington.\r\n",
+ "description": "On 7th of October 2001, the first day of the US-led war in Afghanistan, an armed, CIA-controlled predator drone was following the Taliban leader Mullah Omar in Kandahar. Due to communication problems, the drone, remotely controlled from the agency‘s headquarters in Langley, Virginia, fired a hellfire missile on a truck outside the building with Omar, allegedly killing two of his bodyguards. The Taliban leader escaped during the chaos following the airstrike. This event marks the first time a modern drone killed a human being.\r\nThe General Atomics Aeronautical MQ-1L Predator No. 3034 that executed the mission is on display at the Smithsonian National Air and Space Museum in Washington, D.C.\r\n",
"image": {
- "uri": "",
+ "uri": "https://marsupial.s3.amazonaws.com/armory/5d3d9340-4a13-11e7-a34a-51568e9d74fe.jpg",
"caption": "",
- "width": "",
- "height": ""
+ "width": "700",
+ "height": "437"
},
- "credit": "Smithsonian Institution, National Air and Space Museum, D.C. Washington (“Do not reproduce without permission”) \r\n",
+ "credit": "Smithsonian Institution, National Air and Space Museum, D.C. Washington\r\n",
"links": [
{
"text": "Link text",
@@ -1274,7 +1271,7 @@ export const backupDB = {
"medium": "Item",
"category": "Drones",
"keywords": "#Drone #UAV #Airstrike #US-Army #War on Terror #Weapons #Afghanistan #Arts #Attack #Airplanes #Evidence #US-Army\r\n",
- "description": "Afghanistan has suffered through long decades of war. From conflict with the Soviet Union in the 1980s and civil war to 16 years of US-led NATO combat missions. While war has political, economic and social impacts it is also present in art. In case of Afghan art, it is expressed in the ancient way of woven rugs that illustrate daily life. While it was Kalashnikovs, tanks and grenades during the Soviet Union conflict, it is drones today that occasionally appear on the rugs since the US started operating them in 2001. The world of ancient art and modern warfare collide on the so called ‘war rugs’, but they also reflect the violent conditions of life under war.\r\n",
+ "description": "Afghanistan has suffered through many long decades of war, from its conflict with the Soviet Union in the 1980s and the subsequent civil war, to 16 years of US-led NATO combat missions. While war has political, economic and social impacts, it is also present in art. In the case of Afghan art, it is expressed in the ancient form of woven rugs that illustrate daily life. Rugs depicted Kalashnikovs, tanks and grenades during the Soviet Union conflict; drones began appearing on the rugs since the US started operating them in 2001. The world of ancient art and modern warfare collide on the so called ‘war rugs’, but they also reflect the violent conditions of life under war.",
"image": {
"uri": "http://media.npr.org/assets/img/2015/02/07/warrug1-16c4e0185e8d3183ed29d1b8b3e982dcd9f937ef-s1000-c85.jpg",
"caption": "",
@@ -1303,7 +1300,7 @@ export const backupDB = {
"medium": "Program",
"category": "Surveillance",
"keywords": "#Privacy #Security #TheInternet #Anonymous #Activism #Encryption #Computing #Data #Protection #Digital Rights #Freedom #Net Politics #Technology #Censorship\r\n",
- "description": "Tor (The Onion Routing) is a anonymizing network. Referring to the structure of an onion it is build up in layers: requests don’t go directly to the destination address but travel through a chain of proxy servers. That way the original IP-address and identity is not traceable and all data is encrypted. Tor conceals users information from anyone conducting network surveillance or traffic analyses.\r\nActivist, whistleblowers and journalist around the world depend on Tor for secure, anonymous communication and to circumvent censorship.\r\n",
+ "description": "Tor (The Onion Router) is a anonymizing network. Inspired by the structure of an onion, it is built up in layers: requests don’t go directly to the destination address but travel through a chain of proxy servers. That way the original IP address and identity is not traceable, and all data is encrypted. Tor conceals users' information from anyone conducting network surveillance or traffic analysis.\r\n\r\nActivists, whistleblowers and journalists around the world depend on Tor for secure, anonymous communication to circumvent censorship.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f7e90360-36f5-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1328,7 +1325,7 @@ export const backupDB = {
"medium": "Item",
"category": "Drones",
"keywords": "#Drone #UAV #Airstrike #US-Army #War on Terror #Weapons #Classified #Airplanes #Arts #Afghanistan #Architecture #Attack #HumanRights #Morality #Pakistan #Violence #Warfare\r\n",
- "description": "The first known targeted drone assassination outside a war zone by the US took place in Yemen on November 3rd, 2002. Areas most affected by drone warfare are generally outside of effective state control. Therefore non-residents like journalists, are prevented from investigating events and access evidence, and media coverage is uneven. The image depicts a visual investigation on the strike path of a drone in Miranshah, north Waziristan on March 2012 by Forensic Architecture. Aiming on focussing on the spatial dimension of drone strikes, they analysed video testimony that was smuggled out of the area, in order to reconstruct the space of the strike and investigate the event. The white dotted lines show the potential places where people died.\r\n",
+ "description": "The first known targeted drone assassination outside a war zone by the US took place in Yemen on November 3rd, 2002. Areas most affected by drone warfare are generally outside effective state control. Therefore non-residents (like journalists) are prevented from investigating events and accessing evidence, and media coverage is uneven. The image depicts a visual investigation on the strike path of a drone in Miranshah, north Waziristan, on March 2012 by Forensic Architecture. Focusing on the spatial dimension of drone strikes, they analyzed video testimony that was smuggled out of the area, in order to reconstruct the space of the strike and investigate the event. The white dotted lines show the potential places where people died.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/60a9e090-36f6-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1353,7 +1350,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#Facebook #Twitter #Yahoo #Privacy #Protection \r\n",
- "description": "Social Network Surveillance means the practice of creating maps based on data from social networking sites such as Facebook and Twitter. These \"maps\" are mined to extract information such as interests, friendships, affiliations, beliefs and activities. US government agencies like the NSA are investing heavily in research involving social network analysis. Some people haved claimed that the use of social networking sites is in itself a form of ‘participatory surveillance’ where users essentially perform surveillance on themselves and others, putting and using personal information on public websites.\r\n",
+ "description": "Social Network Surveillance means the practice of creating maps based on data from social networking sites such as Facebook and Twitter. These \"maps\" are mined to extract information such as interests, friendships, affiliations, beliefs and activities. US government agencies like the NSA are investing heavily in research involving social network analysis. Some people have claimed that the use of social networking sites is in itself a form of ‘participatory surveillance’ where users essentially perform surveillance on themselves and others, posting and consuming personal information on public websites.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/c1714490-36f6-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1378,7 +1375,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#WikiLeaks #Whistleblower #Classified Information #Covert Operations #Transparency #Evidence #Governments #Secrets #Human Rights #Intelligence #Information #Politics #Scandals #Digital Rights #Disclosure #Freedom \r\n",
- "description": "WikiLeaks is an international, non-profit media organisation that publishes classified information and news-leaks from anonymous sources. It was founded in Iceland in 2006 and uses the slogan “We open governments.” Julian Assange is described to be the director and spokesperson of the organisation devoted to bringing transparency to governments, accessibility to information, and protecting whistleblowers. Over the past years WikiLeaks draw a lot of global attention to itself by publishing leaked classified information, for instance on the US-Military and the war in Afghanistan and Iraq (2010), the US State Department diplomatic cables (2010) and the Podesta Emails during the US presidential election campaign in 2016. \r\n\r\nEcuador granted Assange political asylum in 2012, since then he has been a resident in the Ecuadorian Embassy in London, afraid to leave as he fears an extradition to the US by Sweden, where he is accused of sexual assaults. In the US he could face several penalties, including the death sentence, for his work with WikiLeaks. ",
+ "description": "WikiLeaks is an international, non-profit media organisation that publishes classified information and news leaks from anonymous sources. It was founded in 2006 in Iceland and uses the slogan “We open governments.” Julian Assange is described to be the director and spokesperson of the organization, devoted to bringing transparency to governments, accessibility to information, and protection to whistleblowers. Over the past decade WikiLeaks has drawn global attention to itself by publishing leaked classified information, for instance on the US Military and the war in Afghanistan and Iraq (2010), the US State Department diplomatic cables (2010) and the Podesta Emails during the US presidential election campaign in 2016. \r\n\r\nEcuador granted Assange political asylum in 2012. Since then, he has been a resident in the Ecuadorian Embassy in London, unwilling to leave as he fears extradition to the US from Sweden, where he is accused of sexual assault. In the US he could face several charges, including the death penalty, for his work with WikiLeaks. ",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/fec0c370-36f6-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1407,7 +1404,7 @@ export const backupDB = {
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Satellite #Photography #Secrets #Arts #Reconnaissance\r\n",
- "description": "Since the beginning of man, humans have looked into the sky to make sense of the world. Living in an modern age of total surveillance, the artist Trevor Paglen explores the night sky to reveal what is invisible and deliberately obscure – like secret US-military surveillance satellites. In the experimental photography series Another Night Sky he makes use of data gathered by amateur satellite observers to investigate the moment a surveillance satellite enters the realm of visibility. Paglen then captures it with long exposure time. What appears in the photograph is a fine line in a vast sky which gives evidence to the satellites existence.\r\n",
+ "description": "Since the dawn of history, humans have looked into the sky to make sense of the world. Living in an modern age of total surveillance, the artist Trevor Paglen explores the night sky to reveal what is invisible and deliberately obscure – like secret US military surveillance satellites. In the experimental photography series <i>The Other Night Sky</I> he makes use of data gathered by amateur satellite observers to investigate the moment a surveillance satellite enters the realm of visibility. Paglen then captures it with long exposure time. What appears in the photograph is a fine line in a vast sky which gives evidence of the satellites' existence.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/3f642840-36f7-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1432,7 +1429,7 @@ export const backupDB = {
"medium": "Photographs",
"category": "Surveillance",
"keywords": "#Israel #Drones #UAV #Palestine #Simulation #IDF #Suspect \r\n",
- "description": "Miki Kratsman’s Targeted Killing examines the term “focused foiling” coined by the IDF (Israel Defense Forces). For this series, Kratsman uses a special lens, which is commonly used by UAV’s. The outcome is an image that appears to be shot seconds before a targeted killing. The photographed characters in this work are Palestinian civilians going about their daily lives. The way they are being photographed echoes the imagery of threatening “suspects”.\r\n",
+ "description": "Miki Kratsman’s <i>Targeted Killing</i> examines the term “focused foiling”, coined by the Israel Defense Forces (IDF). For this series, Kratsman uses a special lens, which is commonly used by UAV’s. The result is an image that appears to be shot seconds before a targeted killing. The photographed characters in this work are Palestinian civilians going about their daily lives. The way they are being photographed echoes the imagery of threatening “suspects”.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/722d9aa0-4795-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
@@ -1490,7 +1487,7 @@ export const backupDB = {
"medium": "Video",
"category": "Surveillance",
"keywords": "#Iraq #Attack #Leak #Wikileaks #Disclosure #Ethics #US-Army #Airstrike #Violence #Morality #Warfare\r\n",
- "description": "On July 12th 2007 the US Army conducted a series of airstrikes in New Baghdad, Iraq, killing over a dozen civilians, including two war correspondents working for Reuters news agency. The classified video footage of the helicopter gunship was released by WikiLeaks on 5th April 2010 and caused a global discussion on the legality and morality of the attacks.\r\n",
+ "description": "On July 12th, 2007, the US Army conducted a series of airstrikes in the neighborhood of New Baghdad, Iraq, killing over a dozen civilians, including two war correspondents working for the Reuters news agency. Classified video footage from the helicopter gunship was released by WikiLeaks on April 5th, 2010, and caused a global discussion on the legality and morality of these homicides.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9a0aff80-36fc-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1515,7 +1512,7 @@ export const backupDB = {
"medium": "Film",
"category": "Drones",
"keywords": "#Surveillance #Drone #UAV #Technology #Camera #Verticality #Control #All-Seeing Eye #Military #Reconnaissance #Remote Sensing #Warfare #Information #Sensor #US-Air Force #Afghanistan #Airstrike #Attack #Morality #Ethics \r\n",
- "description": "Omar Fast’s film ‘5000 Feet is The Best’, addresses politics of visuality and how the reality of warfare is perceived when the world is made of fake images and special effects. The title is taken from a former drone operator who is interviewed. He reveals why 5000 feet is the best height for a combat drone to fly, as it means he can make out someones shoes and facial hair.\r\n",
+ "description": "Omar Fast’s film <i>5000 Feet is The Best</i> addresses the politics of visuality and how the reality of warfare is perceived when the world is made of fake images and special effects. The title is taken from a former drone operator who is interviewed. He reveals why 5000 feet is the best height for a combat drone to fly, as it means he can make out someone's shoes and facial hair.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/d388dcf0-36fc-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1540,7 +1537,7 @@ export const backupDB = {
"medium": "Technology",
"category": "Drones",
"keywords": "#Surveillance #Drone #UAV #Technology #Camera #Verticality #Control #All-Seeing Eye #Military #Panopticon #Reconnaissance #Remote Sensing #Warfare #Data #Information #Sensor #US-Air Force\r\n",
- "description": "Gorgon Stare is a revolutionary airborne surveillance system made that is mounted on the underside of a drone. It’s electro-optical and infrared sensors system includes nine video cameras which are able to transmit live video images of physical movement across an entire town. While the system can see everything, the adversary on the ground does not know what or who is being looked at.\r\n\r\nIn greek mythology, the Gordon was a creature which unblinking eyes turned it’s beholder into stone.\r\n",
+ "description": "Gorgon Stare is a revolutionary airborne surveillance system made that is mounted on the underside of a drone. Its electro-optical and infrared sensor system includes nine video cameras, which are able to transmit live video images of physical movement across an entire town. While the system can see everything, the adversary on the ground does not know what or who is being looked at.\r\n\r\nIn greek mythology, the Gorgon was a creature whose unblinking eyes turned its beholder into stone.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/205dbf50-36fd-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1565,7 +1562,7 @@ export const backupDB = {
"medium": "Art",
"category": "Surveillance",
"keywords": "#Surveillance #Counter-Surveillance #Refugee-Crisis #Europe #Horn of Africa #Mediterranean #Boat #Satellite #NATO #Libya #Navy #Arts\r\n",
- "description": "The Oceanography project supported a coalition of NGOs demanding accountability for the deaths of migrants in the central Mediterranean Sea, a region that was tightly monitored through satellites by the NATO-led coalition intervening in Libya. The project’s efforts were focused on what is now known as the “left-to-die boat” case, where 63 migrants lost their lives drifting for 14 days within the NATO maritime surveillance area. The project team managed to reconstruct precisely how events unfolded and demonstrated how different actors operating in the Mediterranean used complex overlapping jurisdictions at sea to evade their responsibility for rescuing people in distress.\r\n",
+ "description": "The Oceanography project supported a coalition of NGOs demanding accountability for the deaths of migrants in the central Mediterranean Sea, a region that was tightly monitored with satellites by the NATO-led coalition intervening in Libya. The project’s efforts were focused on what is now known as the “left-to-die boat” case, where 63 migrants lost their lives, drifting for 14 days within the NATO maritime surveillance area. The project team managed to reconstruct precisely how events unfolded and demonstrated how different actors operating in the Mediterranean used complex overlapping jurisdictions at sea to evade their responsibility for rescuing people in distress.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/747bddb0-36fd-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1594,7 +1591,7 @@ export const backupDB = {
"medium": "Image",
"category": "Drones",
"keywords": "#Drones #Airstrike #Attack #Violence #Ethics #Morality #CIA #USA #Pakistan\r\n",
- "description": "On 24th of October 2012 two missiles of a US-Drone hit a village in North Waziristan, Pakistan, and killed a 67-year-old midwife, who was gathering okra with her two grandchildren in a garden. The children were injured and rushed to the hospital. Media reports of that day claimed that militants had been killed, although Rafiq ur Rehman, a Pakistani primary school teacher and father to the family claimed otherwise. He and his children, Zubair, 13, and Nabila, 9 were the first family members of victims of an alleged US-Drone strike to give testimony at the US-Congress. When Zubair pleaded to the lawmakers, he described the situation in his home: “Now I prefer cloudy days when the drones don’t fly. When the sky brightens and becomes blue, the drones return and so does the fear.“\r\n",
+ "description": "On October 24th, 2012, two missiles of a US drone hit a village in North Waziristan, Pakistan, killing a 67-year-old midwife who was gathering okra in her garden with her two grandchildren. The children were injured and rushed to the hospital. Media reports of that day claimed that militants had been killed, although Rafiq ur Rehman, a Pakistani primary school teacher and father to the family claimed otherwise. He and his children, Zubair, 13, and Nabila, 9, were the first family members of victims of an alleged US Drone strike to give testimony at the US Congress. When Zubair pleaded to the lawmakers, he described the situation in his home: “Now I prefer cloudy days when the drones don’t fly. When the sky brightens and becomes blue, the drones return and so does the fear.“\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f3ea3dd0-36fd-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1619,7 +1616,7 @@ export const backupDB = {
"medium": "Multimedia Art Project",
"category": "Surveillance",
"keywords": "#Accent #Refugees #Migration #Security #Language #Asylum #Deportation #Detention #Arts",
- "description": "In his 2012 work “Conflicted Phonemes”, Lawrence Abu Hamdan deals with controversial usage of speech language analysis. He held a meeting with a group of 12 Somali refugees who had been subjected to accent analysis by the Dutch immigration authorities and later had their asylum requests rejected. Hamdan aims to show how those tests seek to determine if the asylum seekers origins are from relatively safe regions in the north of the country. Together with refugees and researchers he developed maps which explore the hybrid nature of accent.\r\n",
+ "description": "In his 2012 work <i>Conflicted Phonemes</i>, Lawrence Abu Hamdan dealt with a controversial usage of linguistic analysis. He held a meeting with a group of 12 Somali refugees who had been subjected to accent analysis by the Dutch immigration authorities and later had their asylum requests rejected. Hamdan aims to show how those tests seek to determine if the asylum seekers originate from relatively safe regions in the north of the country. Together with refugees and researchers, he developed maps which explore the hybrid nature of accent.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/17ac7cf0-36ff-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1644,7 +1641,7 @@ export const backupDB = {
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Google #Googlemaps #Surveillance #Privacy #Streetart ",
- "description": "The work Street Ghosts is a series of photographs taken from Google Street View and printed at life-size scale. The artist Paolo Cirio later posted the portraits as street art inventions at the same locations where they had been taken. The artwork re-contextualizes readymade online material and documents shifting social norms and policies concerning privacy. Cirio explains how he aimed to expose the specters of Google’s misappropriated data: the bodies of people captured by Google’s Street View cameras, whose ghostly, virtual presence was marked in a street art fashion at the spot where they were photographed. The images don’t offer details, but highlight the depicted people’s uncanny presence.\r\n",
+ "description": "The work <i>Street Ghosts</i> is a series of photographs taken from Google Street View and printed at life-size scale. The artist Paolo Cirio later posted the portraits as street art interventions at the same locations where they had been taken. The artwork re-contextualizes readymade online material and documents shifting social norms and policies concerning privacy. Cirio explains how he aimed to expose the specters of Google’s misappropriated data: the bodies of people captured by Google Street View cameras, whose ghostly, virtual presence was marked in a street art fashion at the spot where they were photographed. The images don’t offer details, but highlight the depicted people’s uncanny presence.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/5ac882e0-36ff-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1673,7 +1670,7 @@ export const backupDB = {
"medium": "Artwork",
"category": "Drones",
"keywords": "#Drone #Verticality #Arts #Morality #War #Governments #Airstrike #Airplanes #Attack #Camouflage #Counter Surveillance #Control #Ethics #Protection #Reconnaissance #Weapons #Warfare #US-Army #UAV #Survival\r\n",
- "description": "The Drone Survival Guide contains the silhouettes of the most common drone species used today and in the near future. Nationality and whether they are used as a surveillance platform or for deadly force are indicated. All drones are drawn in scale for size indication. From the smallest consumer drones measuring less than 1 meter, up to the Global Hawk measuring 39,9 meter in length. The guide is printed on reflective paper, referring to the possibility to hide from a drone infrared camera by using reflective material or a space blanket, as it camouflages the heat signature.\r\n",
+ "description": "The <i>Drone Survival Guide</i> contains the silhouettes of the most common drone species used today and in the near future. The chart indicates each drone's nationality, and whether they are used as a surveillance platform or for deadly force. All drones are drawn to scale, from the smallest consumer drones measuring less than 1 meter, up to the Global Hawk measuring 39.9 meter in length. The guide is printed on reflective paper, referring to the possibility of hiding from a drone's infrared camera by using reflective material or a space blanket, as it camouflages the heat signature.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f267aa90-36ff-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1702,7 +1699,7 @@ export const backupDB = {
"medium": "Artwork",
"category": "Drones",
"keywords": "#Drone #Verticality #Arts #Morality #War #Governments #All-Seeing Eye #Airstrikes #Attack #Violence #Social Media #The Arts #Photography\r\n",
- "description": "Dronestagram posts satellite images of locations that have been a target of a drone strike along with a short summary to Instagram, Tumblr and Twitter. For many of us, foreign places that are affected by these strikes, and are targets of a largely invisible technology (remotely controlled, unmanned, aerial vehicles, loaded with weapons) feels very abstract. Using social media to report the strikes, shifts them into greater visibility and awareness. In James Bridle's words, who is the artist behind the project: “These are just images of foreign landscapes, still; yet we have got better at immediacy and intimacy online: perhaps we can be better at empathy too.” The records of the strikes are mostly drawn from the Bureau of Investigative Journalism, which compiles reports from Pakistan, Yemen and Somalia.\r\n",
+ "description": "Dronestagram posts satellite images of locations that have been a target of a drone strike along with a short summary to Instagram, Tumblr and Twitter. For many of us, these foreign places feel very abstract. Areas affected by these strikes are targets of a largely invisible technology - remotely controlled, unmanned aerial vehicles, loaded with weapons. Using social media to report the strikes, shifts them into greater visibility and awareness. James Bridle, the artist behind the project, writes: “These are just images of foreign landscapes, still; yet we have got better at immediacy and intimacy online: perhaps we can be better at empathy too.” The records of the strikes are mostly drawn from the Bureau of Investigative Journalism, which compiles reports from Pakistan, Afghanistan, Yemen and Somalia.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/4fb725e0-3700-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1727,7 +1724,7 @@ export const backupDB = {
"medium": "Case ",
"category": "Surveillance",
"keywords": "#NSA #Wikileaks #Snowden #Social Media #PRISM #phones #Surveillance #Counter-Surveillance #Privacy #Internet #Encryption #Hacking Computing #Five Eyes\r\n",
- "description": "Snowden’s leaks have shed light on the implications of several secret treaties signed by members of the UKUSA community in their efforts to implement global surveillance. They mostly emanated from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden. In addition to a trove of US federal documents, Snowden's cache contains thousands of Australian, British and Canadian intelligence files. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention. The Snowden case has had a lasting influence on the public awareness and discourse on surveillance today.\r\n",
+ "description": "Edward Snowden’s leaks have shed light on the implications of several secret treaties signed by members of the UK/USA community in their efforts to implement global surveillance. These revelations stem from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden. In addition to a trove of US federal documents, Snowden's cache contains thousands of Australian, British and Canadian intelligence files. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention. The Snowden case has had a lasting influence on public awareness and discourse on surveillance today.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/ab337260-3701-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1760,7 +1757,7 @@ export const backupDB = {
"medium": "Program",
"category": "Surveillance",
"keywords": "#NSA #Five Eyes #Snowden #Internet #Social Media #PRISM #Surveillance #Privacy #Encryption #Big Brother #Interception #Covert Operations #Computing #Data #Network #Wiretapping \r\n",
- "description": "PRISM is a highly-classified program intended to grant direct access to internet servers for the NSA to wiretap. Since 2007, it would collect material including individual search history, the contents of emails, file transfers and live chats from internet giants like Google, Apple or Facebook. Being part of the Snowden archive, it was the first leak to be published, simultaneously by the Guardian and the Washington Post on June the 7th, 2013 which marked the begin of the Snowden-affair.\r\nThe leaked 41 pages power-point document intended for internal use only, demonstrates information on the extensive surveillance program. Among others it includes the facts that most of the world’s electronic communication passes through the US, which makes monitoring from intelligence analysts possible. The logo chosen represents the mission’s purpose: the prism refracting invisible noise into visible information.\r\n",
+ "description": "PRISM is a highly-classified program intended to grant direct access to internet servers for the NSA to wiretap. Since 2007, it has collected material which includes individual search history, the contents of emails, and file transfers and live chats from internet giants like Google, Apple or Facebook. As part of the Snowden archive, it was the first leak to be published, being announced simultaneously by the Guardian and the Washington Post on June 7th, 2013, marking the begin of the Snowden Affair.\r\n\r\nIntended for internal use only, the leaked 41 page PowerPoint document describes an extensive surveillance program. It reveals that most of the world’s electronic communications pass through the US, which makes monitoring possible by intelligence analysts. The logo above represents the mission’s purpose: the prism refracting invisible noise into visible information.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/0de8eac0-3702-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1785,7 +1782,7 @@ export const backupDB = {
"medium": "Program",
"category": "Surveillance",
"keywords": "#GCHQ #NSA #Five Eyes #Snowden #Internet #Social Media #Surveillance #Privacy #Encryption #Big Brother #Interception #Covert Operations #Computing #Data #Network #Wiretapping \r\n",
- "description": "The Snowden revelation also contained evidence of the US and the UK spy agencies tapping into submarine network structures. These fibre optic cables are part of the physical backbone of the internet and essential to worldwide data flows. All communication flows through them, in favour of „Mastering the Internet“ – a project by GCHQ. The subsidiary of that project codenamed TEMPORA stores huge volumes of data drawn from fibre-optic cables for up to 30 days. The data then can be sifted through and analysed.\r\n",
+ "description": "The Snowden revelation also contained evidence of the US and the UK spy agencies tapping into submarine network structures. These fiber optic cables are part of the physical backbone of the internet and essential to worldwide data flows. All communication moves through them, in favor of \"Mastering the Internet\" – a project by GCHQ. One subsidiary of that project, codenamed TEMPORA, stores huge volumes of data drawn from fiber optic cables for up to 30 days. The data then can be sifted through and analyzed.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/4b9d7790-3703-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1818,7 +1815,7 @@ export const backupDB = {
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Verticality #Arts #Surveillance #Transparency #Activism #Architecture #All-Seeing Eye #CCTV #Public #Privacy #Police State #Internet #Watching\r\n",
- "description": "In 2012, one year after Ai Weiwei was arrested and detained for 81 days for „inciting subversion of state power“ – an ambiguous charge often leveled against citizens who criticize Communist Party rule – he launched weiweicam.com. At the time, Ai was under house arrest and continually surveilled by the Chinese government. In a defiant parody, Ai set up cameras in his house and studio and live broadcast footage of his every move on the internet to „aid“ the government in keeping an eye on him. This selfimposed scrutiny attested to the cencorship and repression being inflicted on the artist yet the revelation was short-lived. The government shut down weiweicam.com after only forty-six hours, but not before over 5.2 million viewers visited the site.",
+ "description": "In 2011, Ai Weiwei was arrested and detained for 81 days for \"inciting subversion of state power\" – an ambiguous charge often leveled against citizens who criticize Communist Party rule. One year later, he launched <i>weiweicam.com</i>. At the time, Ai was under house arrest and was continually surveilled by the Chinese government. In a defiant parody, Ai set up cameras in his house and studio and live broadcast footage of his every move on the internet to \"aid\" the government in keeping an eye on him. This self-imposed scrutiny attested to the censorship and repression being inflicted on the artist, yet the revelation was short-lived. The government shut down weiweicam.com after only forty-six hours, but not before over 5.2 million viewers had visited the site.",
"image": {
"uri": "https://d32dm0rphc51dk.cloudfront.net/6OuzSVQP_rGqIh7FeCJ10g/larger.jpg",
"caption": "",
@@ -1843,7 +1840,7 @@ export const backupDB = {
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Drone #Verticality #Arts #Morality #War #Governments\r\n",
- "description": "Drone Shadows is a series of public installations of artist, writer and technologist James Bridle. The 1:1 scale representation of a drone is supposed to shift the invisible drone warfare closer to our reality. The image depicts the shadow of a The General Atomics MQ-9 Reaper drone. It is used as a surveillance and weapons platform and operated by the US, UK, Australia, France, and NASA.\r\n",
+ "description": "<i>Drone Shadows</i> is a series of public installations of artist, writer and technologist James Bridle. The 1:1 scale representation of a drone is supposed to shift the invisible drone warfare closer to our reality. The image depicts the shadow of a General Atomics MQ-9 Reaper drone. It is used as a surveillance and weapons platform and is operated by the US, UK, Australia, France, and NASA.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/fc519c90-3985-11e7-a9cd-015e907df360.jpg",
"caption": "",
@@ -1873,7 +1870,7 @@ export const backupDB = {
"medium": "Item",
"category": "Surveillance",
"keywords": "#Animal Kingdom #Governments #Spy Satellite #Espionage #Surveillance #Secrets #NRO #Freedom of Information Act #Reconnaissance #Verticality #USA\r\n",
- "description": "When the US National Reconnaissance Office (NRO) launched the classified satellite NROL-39 into space on 6th of December 2013, the logo of the mission received more attention than the mission itself. It depicts an octopus wrapping its arms around the globe accompanied by the slogan: Nothing is beyond our reach. After filing a request about the emblems origin under the Freedom of Information Act, it came to light that the NRO choose the octopus to visually represent the mission, as it is a highly intelligent, versatile creature which arms can reach even the most intricate corners of the world and therefore leaves no space for enemies of the US to hide.\r\n",
+ "description": "When the US National Reconnaissance Office (NRO) launched the classified satellite NROL-39 into space on December 6th, 2013, the logo of the mission received more attention than the mission itself. It depicts an octopus wrapping its arms around the globe accompanied by the slogan: <i>Nothing is beyond our reach</i>. After filing a request about the emblem's origin under the Freedom of Information Act, it came to light that the NRO chose the octopus to represent the mission, as it is a highly intelligent, versatile creature, with arms that can reach even the most delicate corners of the world, leaving no space for enemies of the US to hide.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/23af5950-3713-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1906,7 +1903,7 @@ export const backupDB = {
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#counter-surveillance #collection #commerce #burqa #stealth-wear #pop-up-store #surveillance-market #privacy #data #activism\r\n",
- "description": "Stealth Wear is a commercially distributed collection of garments developed by the counter-surveillance artist Adam Harvey that shield against thermal imaging, a surveillance technology used widely by military drones to target people. \r\n",
+ "description": "<i>Stealth Wear</i> is a commercially distributed collection of garments developed by the counter-surveillance artist Adam Harvey. The garments are designed to shield against thermal imaging, a surveillance technology widely used by military drones to target people.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b6a74aa0-3714-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1935,7 +1932,7 @@ export const backupDB = {
"medium": "Film",
"category": "Surveillance",
"keywords": "#Governments #Whistleblowing #WikiLeaks #Activism #Wiretapping #Classified Information #Disclosure #NSA #Encryption #Surveillance #Hacking #Ethics #Morality #Electronic Warfare #Intelligence #Information #Secrets #Transparency\r\n",
- "description": "Citizenfour is a documentary film directed by Laura Poitras on the NSA spying scandal that Edward Snowden disclosed. In early 2013, Poitras was contacted by Citizenfour – the alias used by Snowden. Poitras herself became a protagonist of the affair, using her camera to document the unfolding events. She processed her experience in the documentary named after Snowdens pseudonym, which won several awards including the Academy Award for Best Documentary Feature at the 2015 Oscars.\r\n",
+ "description": "<i>Citizenfour</i> is a documentary film directed by Laura Poitras about Edward Snowden's disclosure of NSA spying. In early 2013, Poitras was contacted by \"Citizenfour\" – the alias used by Snowden. Poitras herself became a participant in the affair, using her camera to document the situation as it unfolded. She processed her experience in this documentary named after Snowden's pseudonym, which won several awards including the Academy Award for Best Documentary Feature at the 2015 Oscars.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/38b16440-3715-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -1964,7 +1961,7 @@ export const backupDB = {
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Arts #Activism #Surveillance #Location #Counter-Surveillance #Information #CCTV #All-Seeing Eye #Control #Privacy #Espionage #Ethics #Police\r\n",
- "description": "In 2011, Ai Weiwei disappeared for 81 days. Detained by Chinese authorities in a secret prison, the artist was eventually released on bail without explanation. He, his family and his studio are under constant surveillance – something he is addressing frequently in his artworks. Memorializing the CCTV cameras constructed by authorities outside is Bejing studio to record every move, he replicates them in marble. Using marble, a medium of monuments and gravestones, he ironically elevates historically-loaded material into the contemporary discourse of privacy and surveillance. Taking the form of the electronic eye, as the symbol of modern surveillance, he evokes themes of paranoia, voyeurism and the omnipresent of authoritarian policing forces.\r\nAi’s personal respond to constant surveillance is to live his life as an open book, endlessly documenting his everyday encounters via social media. If everything is transparent there is nothing to spy on.\r\n",
+ "description": "In 2011, Ai Weiwei disappeared for 81 days. Detained by Chinese authorities in a secret prison, the artist was eventually released on bail without explanation. He, his family, and his studio are under constant surveillance – something he addresses frequently in his artworks. Ai has memorialized the CCTV cameras installed by authorities outside his Beijing studio to record his every move; he replicates the cameras as sculpture. Using marble, a medium of monuments and gravestones, he ironically elevates historically-loaded material into the contemporary discourse of privacy and surveillance. Taking the form of the electronic eye as the symbol of modern surveillance, he evokes themes of paranoia, voyeurism and the omnipresent authoritarian police forces.\r\n\r\nAi’s personal response to constant surveillance is to live his life as an open book, endlessly documenting his everyday encounters via social media. If everything is transparent, there is nothing to spy on.",
"image": {
"uri": "http://cfileonline.org/wp-content/uploads/2016/05/7a-surveillance-camera-ai-weiwei-overrated-contemporary-ceramic-art-cfile.jpg",
"caption": "",
@@ -1989,7 +1986,7 @@ export const backupDB = {
"medium": "Event",
"category": "Surveillance",
"keywords": "#Migration #X-Ray #Airport #Border Control #Evidence #Transparency\r\n",
- "description": "In 2015 an eight-year-old boy from the Ivory Coast was found in a suitcase by authorities in an attempt to smuggle him into Europe. Ceute, the spanish enclave on the African continent the boy was found, proved to be a popular areas for migrants to try to cross into Europe from Africa.\r\n",
+ "description": "In 2015, authorities discovered an eight-year-old boy from the Ivory Coast in a suitcase, in an attempt to smuggle him into Europe. Ceuta, the Spanish enclave on the African continent where the boy was found, has proved to be a popular areas for migrants to try to cross into Europe from Africa.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/7c197c70-3717-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -2014,7 +2011,7 @@ export const backupDB = {
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Arts #Activism #Signal #Surveillance #Location #Counter-Surveillance #Information #Military #Device #Interception\r\n",
- "description": "The Deep Sweep is an aerospace probe scanning the otherwise out-of-reach signal space between land and stratosphere, with special interest placed in UAV/drone to satellite communication, operating in super-high-frequency in a range of 10GHz to 12GHz. Taking the form of a high-altitude weather balloon, it carries a small computer and radio frequency equipment to study the vast and often secretive world of signals in our skies. Deep Sweep was developed by the Critical Engineering Working Group as a signal-intelligence platform, to be deployed by the public.\r\n",
+ "description": "The Deep Sweep is an aerospace probe scanning the otherwise out-of-reach signal space between land and stratosphere, with special interest placed in UAV drone-to-satellite communication, operating in super-high-frequency in a range of 10GHz to 12GHz. Taking the form of a high-altitude weather balloon, it carries radio frequency equipment and a small computer to study the vast and often secretive world of signals in our skies. Deep Sweep was developed by the Critical Engineering Working Group as a signal-intelligence platform, to be deployed by the public.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e769c1a0-3718-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -2039,7 +2036,7 @@ export const backupDB = {
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Surveillance #Interception #Art #Snowden #Activism #Drone #Signal #GCHQ #Israel #Whistleblowing\r\n",
- "description": "Anarchist was the codename given to a classified program intercepting Israeli drone feeds and fighter jets. Ordered by the U.K.’s Government Communications Headquarters (GCHQ) and the American National Security Agency (NSA) it was done from an intercepting station on a mountaintop in Cyprus. Snapshots of the live signals were found in the Snowden archive by the investigative journalist and filmmaker Laura Poitras, who was involved in publishing them. She printed the colorful images in bigger scale for them to become abstract artworks with a unique aura, carrying evidence and revelations about drone warfare.\r\n",
+ "description": "Anarchist was the codename given to a classified program intercepting Israeli drone feeds and fighter jets. Ordered by the UK's Government Communications Headquarters (GCHQ) and the US National Security Agency (NSA), intercepts were conducted from a mountaintop in Cyprus. Snapshots of the live signals were found in the Snowden archive by the investigative journalist and filmmaker Laura Poitras, who was involved in their publication. She printed the colorful images at large scale, creating abstract artworks with a unique aura, carrying evidence and revelations about drone warfare.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9ac43730-3719-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -2068,7 +2065,7 @@ export const backupDB = {
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Google #Location #Counter-Surveillance #Relocation #Wifi #Device\r\n",
- "description": "SkyLift is small device designed by the countersurveillance artist Adam Harvey that exploits the longstanding vulnerability in geo-location positioning using WiFi and unique MAC addresses. Companies like Google and Apple that rely on the use of WiFi packets from home routers to return the estimated smartphone users position. Until now, this method has required the use of multiple routers and a complicated, expensive setup. SkyLift reintroduces the concept to a new audience using a low-cost, Arduino-compatible WiFi transceiver to relocate the user to almost any location in the world.\r\n",
+ "description": "SkyLift is a small device designed by the counter-surveillance artist Adam Harvey that exploits a longstanding vulnerability in geolocation positioning using WiFi and unique MAC addresses. Companies like Google and Apple rely on the use of WiFi packets from home routers to estimate a smartphone user's position. Until now, this method has required the use of multiple routers and a complicated, expensive setup. SkyLift reintroduces the concept to a new audience using a low-cost, Arduino-compatible WiFi transceiver to move the user to almost any location in the world.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/e2a6ecf0-3719-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -2093,7 +2090,7 @@ export const backupDB = {
"medium": "Documentary Film",
"category": "Drones",
"keywords": "#drones #warfare #PTSD #ethics #testimony #silence #whistleblowing #trigger",
- "description": "Sonia Kennebeck’s film gives rare insight into the US drone war program – with special focus on it’s largely criticized usage in Afghanistan – by depicting the life and testimony of three whistleblowers who, plagued by guilt over participating in the killing of faceless people, decide to break the silence around the drone program and their involvement. The film illustrates how drones wreak devastation and shake up the status quo of modern warfare in terms of ethics and strategy. It demonstrates how the nature of drone warfare makes some drone operatives trigger-happy, while others end up dehumanised and traumatized.\r\n \r\n",
+ "description": "Sonia Kennebeck’s film <i>National Bird</i> gives rare insight into the US drone war program – with special focus on its heavily criticized use in Afghanistan – by depicting the life and testimony of three whistleblowers. Plagued by guilt over their participation in the killing of faceless people, the whistleblowers decided to break the silence around the drone program and their involvement. The film illustrates how drones wreak devastation and disrupt the status quo of modern warfare in terms of ethics and strategy. It demonstrates how the nature of drone warfare makes some drone operatives trigger-happy, while others end up dehumanised and traumatized.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b07d2b80-371a-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -2122,7 +2119,7 @@ export const backupDB = {
"medium": "Artwork",
"category": "Drones",
"keywords": "#Drones #Fear #Depression #Opera #Uncanniness #Technology #Grace #Generation #Art",
- "description": "Angst (German: “Fear”) is an opera in three acts by the German artist Anne Imhof. Angst II forms the climax and turning point. The work consists of music, text, sculptural elements, actors, animals and controlled drones that fly ominously above the crowd and thus create an overall uncanny atmosphere. Somewhat suspended in time and space, the ‘characters’ of Angst seem kept in a state between boredom and dreaminess. Whether the drones’ function is to surveil the works participants or serve as an aesthetic element is not revealed. \r\n",
+ "description": "<i>Angst</i> (German: “Fear”) is an opera in three acts by the German artist Anne Imhof. Angst II forms the climax and turning point. The work consists of music, text, sculptural elements, actors, animals and controlled drones that fly ominously above the crowd and thus create an overall uncanny atmosphere. Somewhat suspended in time and space, the ‘characters’ of Angst seem kept in a state between boredom and dreaminess. Whether the drones’ function is to surveil the works' participants or serve as an aesthetic element is not revealed.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/1a884680-371c-11e7-a37a-4579121b15f0.jpg",
"caption": "",
@@ -2151,7 +2148,7 @@ export const backupDB = {
"medium": "Publication",
"category": "Surveillance",
"keywords": "#Whistleblowing #Dissent #CIA #Control #Privacy #Surveillance #Information #Secret Service #Activism #Civil Rights #Classified Information #Covered Operation #Disclosure #Espionage #Intelligence #Secrets #USA",
- "description": "CovertAction Information Bulletin was a leading progressive publication focused on being critical of US foreign policy, the CIA, NSA, FBI, corporate crime and repression in the US and abroad. It was co-founded in 1978 by former CIA case officer Philip Agee, who became a leading opponent of CIA practices after he left the agency in 1968. The publication was renamed to CovertAction Quarterly in 1992; it regularly published names of undercover agents and was targeted by Congress who passed the Intelligence Identities Protection Act in 1982, which made the practice of revealing names of agents illegal under US law.\r\nCovertAction Quarterly ceased publishing in 2005, having released a total number of 78 issues.",
+ "description": "<i>CovertAction Information Bulletin</i> was a leading progressive publication focusing on criticism of US foreign policy, the CIA, NSA, FBI, and corporate crime and repression in the US and abroad. It was co-founded in 1978 by former CIA case officer Philip Agee, who became a leading opponent of CIA practices after he left the agency in 1968. The publication was renamed to <i>CovertAction Quarterly</i> in 1992; it regularly published names of undercover agents and was targeted by Congress who passed the Intelligence Identities Protection Act in 1982, which made the practice of revealing names of agents illegal under US law.\r\n\r\nCovertAction Quarterly ceased publishing in 2005, having released a total number of 78 issues.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/dc3c9230-3add-11e7-824a-e3c31e607a7a.jpg",
"caption": "",
@@ -2164,7 +2161,7 @@ export const backupDB = {
"dateCreated": "Wed, 17 May 2017 08:50:49 GMT",
"links": [
{
- "text": "Archive",
+ "text": "Archive.org",
"uri": "https://archive.org/details/Issue27CovertActionInformationBulletinIssue27ReligiousRight"
}
]
@@ -2176,7 +2173,7 @@ export const backupDB = {
"medium": "Case",
"category": "Surveillance",
"keywords": "#Espionage #Governments #Intelligence #Information #Spy #Secret Service #Warfare #Ancient #Military #Reconnaissance #Secret Service #Evidence #Covert Operations\r\n",
- "description": "As a military empire the Pharaohs of ancient Egypt deployed spies to surveil the enemy and gather intelligence to spread their hegemony. Some of the earliest extant intelligence documents date back to 1844 B.C. For the spies, seen as a new breed of the public servant, the Ancient Egyptians even coined a new word. The called them “the eyes of the Pharaoh”. A significant historic example of intelligence-gathering was the well-documented Battle of Kadesh, that nearly ended as a disaster for the Egyptians, when Shasu spies led the Pharaoh, Ramses II, into a trap. The concept of employing spies is the first known documentation of an intelligence network in history.\r\n",
+ "description": "As a military empire the Pharaohs of ancient Egypt deployed spies to surveil the enemy and gather intelligence to spread their hegemony. Some of the earliest existing intelligence documents date back to 1844 B.C. For the spies, seen as a new breed of the public servant, the Ancient Egyptians even coined a new word. The called them “the eyes of the Pharaoh”. A significant historic example of intelligence-gathering was the well-documented Battle of Kadesh, which nearly ended as a disaster for the Egyptians when Shasu spies led the Pharaoh, Ramses II, into a trap. This practice of employing spies is the earliest documented intelligence network in history.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9db6dfd0-476b-11e7-bfa2-633db9d19e2a.png",
"caption": "",
@@ -2195,13 +2192,13 @@ export const backupDB = {
"dateCreated": "Fri, 02 Jun 2017 08:17:42 GMT"
},
{
- "id": "sun-tsu-the-art-of-war",
+ "id": "sun-tzu-the-art-of-war",
"date": "5th century BC",
- "title": "Sun Tsu: The Art of War",
+ "title": "Sun Tzu: The Art of War",
"medium": "Book",
"category": "Surveillance",
"keywords": "#Espionage #Surveillance #Spy #Literature #Military #Ancient #Warfare #Intelligence #Information\r\n",
- "description": "The Art of War is a famous treatise about military strategies and tactics, written by the Chinese general Sun Tzu. The text is composed in 13 chapters each describing one aspect of warfare. In the 13th chapter, solely devoted to the use of intelligence and espionage, he writes: \"Enlightened rulers and good generals who are able to obtain intelligent agents as spies are certain for great achievements.\" Chia Lin, a commentator on the book who lived under the T’ang dynasty said that an army without spies is like a man without ears or eyes. The chapter strongly emphasizes on the importance of spies, which are classified in five types, as intelligent sources and how to manage each of them.\r\nThe book, although written in the 5th century BC, was an inspiration to Mao Zedong and found application also outside the field of warfare.\r\n",
+ "description": "The Art of War is a famous treatise about military strategies and tactics, written by the Chinese general Sun Tzu. The text is composed in 13 chapters, each describing one aspect of warfare. The 13th chapter is solely devoted to the use of intelligence and espionage. In it, he writes: \"Enlightened rulers and good generals who are able to obtain intelligent agents as spies are certain for great achievements.\" Chia Lin, a commentator on the book who lived under the T'ang dynasty said that an army without spies is like a man without ears or eyes. The chapter strongly emphasizes on the importance of spies, which are classified in five types, as intelligent sources and how to manage each of them.\r\nThe book, although written in the 5th century BC, was an inspiration to Mao Zedong and found application also outside the field of warfare.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/eff59a60-476c-11e7-bfa2-633db9d19e2a.jpg",
"caption": " ",
@@ -2230,14 +2227,14 @@ export const backupDB = {
"medium": "Biblic Story",
"category": "Surveillance",
"keywords": "#Spy #Religion #Espionage #Geography #Information #Israel #Literature #Reconnaissance #Intelligence #Migration\r\n",
- "description": "The Old Testament is rich in spy stories. One of the most known ones is the story of the 12 spies in the Book of Deuteronomy. Moses, who is leading the Israelis in search of the Promised land, prepares to move in the land of Canaan following their exodus from ancient Egypt. Therefore he appoints 12 spies, according to the Bible, one of each of the ancestral Israelite tribes, to „bring back a report about the route we are to take and the towns we will come to“. Although the spies brought back a cluster of grapes that took two men to carry, demonstrating the fertility of the new land, 10 of the spies where doubtful of the enterprise after reporting of obstacles. Not believing God could help them, the spies persuaded the Israelis it was impossible to conquer the land, the whole nation was doomed to wander in the desert for 40 years. Only the two remaining spies, Joshua and Caleb, who believed in the Promised Land were allowed to enter it after the time of wandering.\r\nMoses recognized the necessity of espionage and continued using it to much better effect in wars, guide the Israelis to be victorious.\r\n",
+ "description": "The Old Testament is rich in spy stories. One of the best known is the story of the 12 spies in the Book of Deuteronomy. Moses, who is leading the Israelis in search of the Promised land, prepares to move in the land of Canaan following their exodus from ancient Egypt. Therefore he appoints 12 spies, one from each of the ancestral Israelite tribes, to \"bring back a report about the route we are to take and the towns we will come to.\" Although the spies brought back a cluster of grapes that took two men to carry, demonstrating the fertility of the new land, 10 of the spies where doubtful of the enterprise after reporting of obstacles. Not believing God could help them, the spies persuaded the Israelis that it was impossible to conquer the land, and that the whole nation was doomed to wander in the desert for 40 years. Only the two remaining spies, Joshua and Caleb, who believed in the Promised Land were allowed to enter it after the time of wandering.\r\n\r\nMoses recognized the necessity of espionage and continued using it to much better effect in wars, guiding the Israelis to victory.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/5912a150-476d-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
"width": "1000",
"height": "884"
},
- "credit": " Giovanni Lanfranco, Moses and the Messengers from Canaan (1621 – 1624). Oil on canvas. The J. Paul Getty Museum, Los Angeles. Open Content.\r\n",
+ "credit": "Giovanni Lanfranco, Moses and the Messengers from Canaan (1621 – 1624). Oil on canvas. The J. Paul Getty Museum, Los Angeles. Open Content.\r\n",
"links": [
{
"text": "Seattle Pacific University",
@@ -2255,7 +2252,7 @@ export const backupDB = {
"medium": "Surveillance Concept",
"category": "Surveillance",
"keywords": "#Spy #Governments #Surveillance #Dissent #Espionage #Geography #Information #Geography #Literature #Reconnaissance #Intelligence #Police #Covert Operations #Control #Military #Politics #Secrets #Ancient #Secret Service #Warfare\r\n",
- "description": "Throughout the history of the Roman Empire, espionage and surveillance were significant elements of the political apparatus. Spies engaged in both foreign and domestic political operations, assessing the disposition of their enemy but also the loyalty of their own population. Several accounts indicate the presence of a secret police, one of which were the infamous frumentarii around the first century AD. They were supply sergeant who originally purchased and distributed grain to become intelligence agents adding manpower to the vast intelligence network of Ancient Rome. Working closely with the urban police, their duties included investigating, arresting and even political assassination. By the 3rd century the secret police was more and more seen as authoritative force or as an occupational army.\r\n",
+ "description": "Throughout the history of the Roman Empire, espionage and surveillance were significant elements of the political apparatus. Spies engaged in both foreign and domestic political operations, assessing the disposition of their enemy but also the loyalty of their own population. Several accounts indicate the presence of secret police, one of which were the infamous <i>frumentarii</i> around the first century AD. Originally supply sergeants who purchased and distributed grain, they gradually became intelligence agents, adding manpower to the vast intelligence network of Ancient Rome. Working closely with the urban police, their duties included investigating, arresting, and even political assassination. By the 3rd century, the secret police was more and more seen as authoritative force or as an occupational army.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/db6d7300-476d-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
@@ -2280,7 +2277,7 @@ export const backupDB = {
"medium": "Historic Event",
"category": "Surveillance",
"keywords": "#Evidence #Surveillance #Aerial-Photography #Airstrike #Cold-War #Missile #Governments #Politics #Warfare #Information #Reconnaissance #USA #Photography #Verticality #Weapons\r\n",
- "description": "The Cuban Missile Crisis was a 13-day-long confrontation between the US and the Soviet Union concerning the American missile deployment in Europe and the Soviet missile deployment in Cuba. The confrontation is considered the closest the Cold War came to escalating into a nuclear war. The 1962 midterm elections were under way in the United States and the White House had denied charges that it was ignoring dangerous Soviet missiles 90 miles from Florida. The United States had sent U-2 surveillance over Cuba, which produced clear aerial images which served as photographic evidence of medium-range (SS-4) and intermediate-range (R-14) ballistic missile facilities. The United States then established a military blockade to prevent further missiles from reaching Cuba. \r\n",
+ "description": "The Cuban Missile Crisis was a 13-day-long confrontation between the US and the Soviet Union concerning the American missile deployment in Europe and the Soviet missile deployment in Cuba. The confrontation is considered the closest the Cold War came to escalating into a nuclear war. The 1962 midterm elections were under way in the United States, and the White House had denied charges that it was ignoring dangerous Soviet missiles 90 miles from Florida. The United States had sent U-2 surveillance over Cuba, producing clear aerial images which served as photographic evidence of medium-range (SS-4) and intermediate-range (R-14) ballistic missile facilities. The United States then established a military blockade to prevent further missiles from reaching Cuba. \r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/a44c54d0-476e-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
@@ -2305,7 +2302,7 @@ export const backupDB = {
"medium": "Case",
"category": "Surveillance",
"keywords": "#Governments #Politics #Scandal #Watergate #Wire Tapping #Surveillance #Bugs \r\n",
- "description": "Watergate was a major political scandal following a break-in at the Democratic National Committee (DNC) headquarters at the Watergate office complex in Washington, D.C. President Nixon’s administration’s attempted cover-up of its involvement. When the case was discovered and investigated by the U.S. Congress, the Nixon administration’s resistance to its probes led to a constitutional crisis.The term Watergate, by metonymy, has come to encompass an array of clandestine and often illegal activities undertaken by members of the Nixon administration, such as bugging and wiretapping the offices of political opponents and people of whom Nixon or his officials were suspicious. Nixon also ordered investigations of activist groups and political figures, using the Federal Bureau of Investigation (FBI), the Central Intelligence Agency (CIA), and the Internal Revenue Service (IRS).\r\n",
+ "description": "Watergate was a major political scandal following a break-in at the Democratic National Committee (DNC) headquarters at the Watergate office complex in Washington, D.C. President Nixon’s administration attempted to cover up its involvement. When the case was discovered and investigated by the U.S. Congress, the Nixon administration’s resistance to its probes led to a constitutional crisis.The term Watergate, by metonymy, has come to encompass an array of clandestine and often illegal activities undertaken by members of the Nixon administration, such as bugging and wiretapping the offices of political opponents and people of whom Nixon or his officials were suspicious. Nixon also ordered investigations of activist groups and political figures, using the Federal Bureau of Investigation (FBI), the Central Intelligence Agency (CIA), and the Internal Revenue Service (IRS).\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b7002a00-4770-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
@@ -2315,7 +2312,7 @@ export const backupDB = {
"credit": "Front Page of The Baltimore Sun from 9th of August, 1974\r\n",
"links": [
{
- "text": "HISTORY",
+ "text": "History.com",
"uri": "http://www.history.com/topics/watergate"
},
{
@@ -2354,7 +2351,7 @@ export const backupDB = {
"medium": "Case",
"category": "Surveillance",
"keywords": "#Surveillance #The Internet #Spy #Algorithm #Big Data #Control #Corporation #Data Protection #Dystopia #Governments #Information #Metadata #Network #Public #Private #Paranoia #Privacy #Sensor #Simulation #Technology\r\n",
- "description": "The Internet of Things describes the interconnectivity of smart devices used in daily life. A modified Coke machine at Carnegie Mellon University became the first Internet connected appliance as early as 1982. It was able to report its inventory and if the beverages were cold. \r\nSince then the landscape of technology changed significantly. Wireless sensors, machine learning, automation and cloud technology are enabling the vision of the Internet of Things. While today’s market of smart devices is striving to make our daily life as efficient as possible, privacy advocates express strong security concern. As these devices are designed like black-boxes, it’s untransparent which data is collected and given away to third parties. From smart home to smart cities – from an security experts standpoint, the IoT enables a sophisticated surveillance network for private corporations and the government. As Silicon Valley critic Evgeny Morozov put it: “Surveillance Marketed As Revolutionary Technology”.",
+ "description": "The Internet of Things describes the interconnectivity of smart devices used in daily life. A modified Coke machine at Carnegie Mellon University became the first Internet-connected appliance as early as 1982. It was able to report its inventory and if the beverages were cold. \r\nSince then, the landscape of technology has changed significantly. Wireless sensors, machine learning, automation and cloud technology are enabling the vision of the Internet of Things. While today’s market of smart devices is striving to make our daily life as efficient as possible, privacy advocates express strong security concerns. As these devices are designed like black-boxes, it's not transparent which data is collected and given away to third parties. From smart home to smart cities – from an security expert's standpoint, the IoT enables a sophisticated surveillance network for private corporations and the government. As Silicon Valley critic Evgeny Morozov put it: “Surveillance Marketed As Revolutionary Technology”.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/a104a710-4772-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
@@ -2379,7 +2376,7 @@ export const backupDB = {
"medium": "App",
"category": "Surveillance",
"keywords": "#BigBrother #CCTV #Surveillance #Counter-Surveillance #Public #Privacy #Technology #Architecture\r\n",
- "description": "Already in 1998 volunteers of the New York Civil Liberties Union walked the streets of Manhattan to find 2,397 surveillance cameras recording people in public space. While the number of CCTV cameras highly increased after 9/11, today’s estimation is roughly 17,000 in all over New York City. \r\nTo raise awareness to the prevalence of surveillance and and the threat they pose to our individual freedom, various application offer techniques to avoid being surveilled. Among them is the citizens science project SPOTTERON that is used to track CCTV cameras in vicinity while the data comes from individuals. Apps for detecting hidden cameras for example in hotelrooms, can also be find for both major smartphone platforms in the respective app stores.\r\n",
+ "description": "In 1998, volunteers of the New York Civil Liberties Union walked the streets of Manhattan to identify 2,397 surveillance cameras recording people in public space. While the number of CCTV cameras highly increased after 9/11, today’s estimate is roughly 17,000 cameras all over New York City.\r\n\r\nTo raise awareness of the prevalence of surveillance, and the threat it poses to our individual freedom, various applications offer techniques to avoid surveillance. Among them is the citizen science project SPOTTERON that is used to track CCTV cameras in one's vicinity. The data comes from individuals. Apps for detecting hidden cameras, for example in hotel rooms, are also available on both major smartphone platforms in their respective app stores.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f1df3dc0-4773-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
@@ -2389,7 +2386,7 @@ export const backupDB = {
"credit": "Photo by Amelia Holowaty Krales / The Verge\r\n",
"links": [
{
- "text": "• Mediaeater MMXIII •",
+ "text": "Mediaeater MMXIII",
"uri": "http://www.mediaeater.com/cameras/"
},
{
@@ -2408,7 +2405,7 @@ export const backupDB = {
"medium": "Artwork",
"category": "Surveillance",
"keywords": "#Arts #Classified Information #Covert Operations #Pentagon #BlackWorld #Control #Espionage #Surveillance #Governments #Intelligence #NSA #CIA #Top-Secret #USA #War on Terror\r\n",
- "description": "Code Names is a list of words, phrases, and terms that designate active military programs whose existence or purpose is classified. These include classified exercises and units, intelligence programs, information compartments, and Pentagon “Special Access Programs.”\r\nThe code names are deliberately nonsensical, often droll and sardonic words or short phrases without discernable connection to the programs they designate. For example, “Bacon Ridge” is an NSA installation in Texas, “Fox Acid” an NSA-controlled Internet server designed to inject malware into unsuspecting web browsers, and “Mystic” a program to collect every phone call from the Bahamas.\r\n",
+ "description": "Code Names is a list of words, phrases, and terms that designate active military programs whose existence or purpose is classified. These include classified exercises and units, intelligence programs, information compartments, and Pentagon “Special Access Programs.”\r\nThe code names are deliberately nonsensical, often droll and sardonic words or short phrases without a discernible connection to the programs they designate. For example: “Bacon Ridge” is an NSA installation in Texas. “Fox Acid” is an NSA-controlled Internet server designed to inject malware into unsuspecting web browsers. “Mystic” is a program to collect every phone call from the Bahamas.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/677fd9e0-4774-11e7-bfa2-633db9d19e2a.jpg",
"caption": "",
@@ -2428,7 +2425,7 @@ export const backupDB = {
"medium": "Program",
"category": "Surveillance",
"keywords": "#Biometrics #Surveillance #Big Data #Governments #Identification #Civil Rights ",
- "description": "The Aadhaar identification system in India is the world largest biometric database of citizens. A 12 digit unique-identity number that is based on individual biometric (eg. iris scans, fingerprints) and demographic data is issued to every resident. The system was launched in 2009 and covers at this point (April 30th 2017) nearly 90% of the total population of India.\r\nThe Aadhaar system rises security concern as privacy advocates fear it as a tool of state surveillance that uses the citizens vulnerability by them giving up personal data. Due to the broad use of the identification number it is also possible for private cooperation to exploit peoples data, if for example a purchase is made with it and the company request and pays for further data linked to that number.\r\n",
+ "description": "The Aadhaar identification system in India is the world's largest biometric database of citizens. A 12 digit unique-identity number is based on individual biometrics (iris scans, fingerprints) and demographic data. The system was launched in 2009 and covers nearly 90% of the total population of India as of April 2017.\r\n\r\nThe Aadhaar system raises security concerns as privacy advocates fear it being a tool of state surveillance, due to the mass collection of personal data. Due to the broad use of the identification number, it is also possible for private companies to exploit people's data; for example, if a purchase is made using the ID number, the seller may pay for further data linked to that number.",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/f9283630-4774-11e7-bfa2-633db9d19e2a.jpg",
"caption": "https://ichef-1.bbci.co.uk/news/660/cpsprodpb/C7CA/production/_95864115_02.jpg\r\n",
@@ -2507,7 +2504,7 @@ export const backupDB = {
{
"id": "facial-recognition",
"title": "Facial Recognition",
- "body": "The Hansel & Gretel exhibition uses a custom facial recognition system that automatically captures visitors' facial biometrics as they move throughout the Armory. At all times, 5 surveillance cameras stream a 1080 pixel image at 10 frames per second (FPS) to a central image processing server located on site. Every frame from every camera is run through a series of computer vision algorithms that detect faces and convert them into biometric face prints. In less than 1 millisecond, using a minimum of 100 x 100 pixels, any face appearing in any surveillance feed is automatically extracted and stored in a local database as a 128-dimension feature vector.\r\n \r\nThese 128-dimension feature vectors represent what makes each face unique relative to other faces. Previous versions of facial recognition technology from the 1990s and early 2000s based recognition on seeing the face in a more human way, as linear combinations of composite photographs or by comparing the geometry between facial landmarks. Current state-of-the-art facial recognition algorithms, including the code used in the Hansel & Gretel system, make use of deep neural networks that automatically determine which combinations of facial features are the most useful for creating enough separation between between thousands of identities. In a controlled testing environment using frontal-pose images, the accuracy exceeds 99%. \r\n \r\nIn practice however, images captured in any surveillance system will typically be less accurate because of the differences between the pose, lighting, expression, optics and fashion accessories worn for the enrollment and capture photos. This effect is slightly minimized in the Hansel & Gretel facial recognition system because visitors are enrolled and matched on the same day. The accuracy of your matched photo will depend mostly on the equivalence of expression and pose between your submitted photo and your captured photos. According to a theory called the Biometric Zoo, match scores are also dependent on the relative similarity or difference of facial features amongst the enrolled population of faces. As with facial recognition technology and biometric recognition used in law enforcement and national security, no match is ever absolutely certain, but only a probabilistic determination based on the available matches in a database.\r\n \r\nIn the US the average person is caught on camera more than 75 times per day. The fact that our identities are captured, analyzed, and stored is a fact of contemporary life that often goes unnoticed, but what are the implications this has on our society?",
+ "body": "The Hansel & Gretel installation uses a custom facial recognition system that automatically captures visitors' facial biometrics as they move throughout the Armory. At all times, 5 surveillance cameras stream a 1920 x 1080 pixel image at 10 frames per second (FPS) to a central image processing server located on site. Every frame from every camera is run through a series of computer vision algorithms that detect faces and convert them into biometric face prints. In less than 10 milliseconds, using a minimum of 100 x 100 pixels, any face appearing in any surveillance feed is automatically extracted and stored in a local database as a 128-dimension feature vector.\r\n \r\nThese 128-dimension feature vectors represent what makes each face unique relative to other faces. Previous versions of facial recognition technology from the 1990s and early 2000s based recognition on seeing the face in a more human way, as linear combinations of composite photographs or by directly comparing the geometry between facial landmarks. Current state-of-the-art facial recognition algorithms, including the code used in the Hansel & Gretel system, make use of deep neural networks that automatically determine which combinations of facial features are the most useful for creating enough separation between between thousands of identities, analyzing the face is a more non-human way. In a controlled testing environment using frontal-pose images, the accuracy exceeds 99%.\r\n \r\nIn practice however, images captured in any surveillance system will typically be less accurate because of the differences between the pose, lighting, expression, optics and fashion accessories worn in the enrollment and capture photos. This effect is slightly minimized in the Hansel & Gretel facial recognition system because visitors are enrolled and matched on the same day. The accuracy of your matched photo will depend mostly on the equivalence of expression and pose between your submitted photo and your captured photos. According to a theory called the Biometric Zoo, match scores are also dependent on the relative similarity or difference of facial features amongst the enrolled population of faces. As with facial recognition technology and biometric recognition used in law enforcement and national security, no match is ever absolutely certain, but only a probabilistic determination based on the available matches in a database and the quality of your enrollment photo.",
"disabled": false,
"__index": 2,
"dateCreated": "Sat, 20 May 2017 21:50:17 GMT",
@@ -2516,7 +2513,7 @@ export const backupDB = {
{
"id": "floor-projections",
"title": "Floor Projections",
- "body": "Every movement in the Drill Hall is tracked and recorded from above by a grid of 56 small computers with infrared (IR) cameras, each attached to a projector suspended on a truss system high above the gently sloping floor. To allow for better tracking in low light conditions we installed an array of floodlights which operate in the near infrared spectrum and are thus invisible to the human eye. Each computer runs a tracking algorithm that compares a preprogrammed image of the floor to the real time camera feed, and subtracts away any redundancy until only the difference features remain. The moving person can thus be isolated, identified, and followed, which triggers a red rectangular outline and grid pattern to appear. \r\n \r\nThe IR image now overlaid with tracking data undergoes a series of visual transformations. The powerful computers are able to make adjustments in cropping, scaling, warping, shifting, rotation, exposure, brightness, and sharpness, all within milliseconds. Only then are the “real time” images sent to the projector. The entirety of the 215 x 145 feet Drill Hall floor is covered by a total projection surface of 12360 x 7850 pixels, with each pixel being approximately ⅕ of an inch. \r\n \r\nThe projections enable visitors to reflect upon the growing web of interconnected devices designed with ever evolving sensing capabilities and make tangible the reality that we leave digital traces almost everywhere.",
+ "body": "Every movement in the Drill Hall is tracked and recorded from above by a grid of 56 small computers with infrared (IR) cameras, each attached to a projector suspended on a truss system high above the gently sloping floor. To allow for better tracking in low light conditions we installed an array of floodlights which operate in the near infrared spectrum and are thus is invisible to the human eye. Each computer runs a tracking algorithm that compares a preprogrammed image of the floor to the real time camera feed, and subtracts away any redundancy until only the difference features remain. The moving person can thus be isolated, identified, and followed, which triggers a red rectangular outline and grid pattern to appear. \r\n \r\nThe IR image now overlaid with tracking data undergoes a series of visual transformations. The powerful computers are able to make adjustments in cropping, scaling, warping, shifting, rotation, exposure, brightness, and sharpness, all within milliseconds. Only then are the “real time” images sent to the projector. The entirety of the 215 x 145 foot Drill Hall floor is covered by a total projection surface of 12360 x 7850 pixels, with each pixel being approximately ⅕ of an inch.",
"disabled": false,
"__index": 3,
"dateCreated": "Sat, 03 Jun 2017 19:11:30 GMT",